Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Prabu, R.
- PB Verification and Authentication for Server using Multi Communication
Abstract Views :160 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai - 600062, Tamilnadu, India
2 Department of Information Technology; Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai - 600062, Tamilnadu, India
1 Department of Computer Science and Engineering, Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai - 600062, Tamilnadu, India
2 Department of Information Technology; Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai - 600062, Tamilnadu, India
Source
Indian Journal of Science and Technology, Vol 9, No 5 (2016), Pagination:Abstract
Objective: To provide Password authentication by cloud through performing tri stages and also to improve the security. Method: First stage is registration phase; it involves issuing of cloud space to user. Cloud space is used for storing all self information of the client which is used for checking authenticity for later usage. Password of user is generated by user or by server based on password user can registered into cloud. If registration process is completed, then users are able to access the server log-in whenever they needed. Protocol based verification and authentication for two different mediums (Duos) uses user's cell phones or mobile devices is used as SMS to avoid hacking of password and backtrack attack using password. Using unique phone number Duos system possesses website and involves a telecommunication service provider in recovery and registration phase-in Duos based authentication system user want to remember only the Long-Term Password (LTP) for login in all websites. Efficient and affordable authentication is provided by Duos. For successful login of user's, they need valid smartcard and correct password. It involves two-factor password phase and cloud space. Findings: Users able to change their password freely in password changing phase and update his/her information to cloud space. Applications/Improvements: The secured web authentication done successfully by using two types of registration which are named as Registration on Website and on the Mobile device. The scalability of the device is achieved.Keywords
Long Time Password (LTP), Mobile Device, QR Code, SOAP Protocol- Perception and Eradication of Energy Exhausting Attacks in WSN
Abstract Views :186 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, St. Peter’s University, Avadi, Chennai - 600054, Tamil Nadu, IN
2 Department of Computer Science and Engineering, Vel Tech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
3 Department of Information Technology, Vel Tech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
4 Department of Computer Science and Engineering, ASET, Palakad - 678557, Kerala, IN
1 Department of Computer Science and Engineering, St. Peter’s University, Avadi, Chennai - 600054, Tamil Nadu, IN
2 Department of Computer Science and Engineering, Vel Tech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
3 Department of Information Technology, Vel Tech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
4 Department of Computer Science and Engineering, ASET, Palakad - 678557, Kerala, IN
Source
Indian Journal of Science and Technology, Vol 9, No 22 (2016), Pagination:Abstract
Microwaves ad-hoc feeler groups are spatially distributed self governing sensors to examine physical or environmental conditions and for conveyance purposes. Besides all the comforts of the life wireless network spouses serious security threats. Here we implement a simulation based model by using both dynamic threshold algorithm and recursive algorithm and hidden terminal process is used to transfer the data packets to the outer region nodes without any hazards. The proposed method detects the attack and restrain from the attacker node in the network based on CS (Cognitive Sensing) node.Keywords
Cognitive Sensing, Dynamic Multicast Routing Protocol, Denial of Service, Hidden Terminal Communication Scheme, Recursive Algorithm, Wireless Sensor Network.- Condition Monitoring of Focusing Nozzle in Abrasive Water Jet Machine using Sound Sensor
Abstract Views :134 |
PDF Views:0
Authors
R. Prabu
1,
A. Manivannan
2
Affiliations
1 Department of Mechanical Engineering, St. Joseph’s College of Engineering, Old Mamallapuram Road, Semmencherry, Chennai – 600119, Tamil Nadu, IN
2 Department of Mechanical, Krishnasamy College of Engineering and Technology, Nellikuppam Main Road, S. Kumarapuram, Cuddalore – 607109, Tamil Nadu, IN
1 Department of Mechanical Engineering, St. Joseph’s College of Engineering, Old Mamallapuram Road, Semmencherry, Chennai – 600119, Tamil Nadu, IN
2 Department of Mechanical, Krishnasamy College of Engineering and Technology, Nellikuppam Main Road, S. Kumarapuram, Cuddalore – 607109, Tamil Nadu, IN