Providing more security to any system requires providing any authentication strategy to that system. There are many authentication strategies, such as textual password, graphical password, etc. But these techniques have some limitation and drawback like they can easily hacked or cracked by using various tools. One of the tools is brute-force algorithm. So, to overcome the drawbacks of existing authentication technique, a new improved authentication strategy is proposed. This strategy is multi-password and multi-factor authentication system as it combines a various authentication techniques such as textual password, graphical password etc. Most important part of 3d password scheme is inclusion of 3d virtual environment. This authentication S...
Authentication is required in stored database systems so that only authorized users can access the d...
Immersive Virtual Reality (IVR) is a growing 3D environment, where social and commercial application...
The most common computer authentication method is to use text usernames and passwords which have var...
Authentication of any system means providing a security to that system. There are number of authenti...
In today’s world, security is important aspect in day to day life .So, everyone used various ways fo...
Current authentication systems suffer from many weaknesses. Textual passwords are common. However, u...
Existing authentication systems is suffering with many weaknesses. In general, textual passwords are...
Abstract- In today’s world, security is important aspect in day to day life.So, everyone used variou...
In today’s world, security is important aspect in day to day life .So, everyone used various ways fo...
In this paper we describe how to implement 3D password. As it is free from textual password as well ...
The purpose of this paper is increasing the safety house and avoiding the weakness of typical word. ...
Authentication is one of the most basic process to provide security to any resource and application ...
Cloud computing is drastically growing technology which provides an on-demand software, hardware, in...
For the verification of authorized users in computer systems, various text based or biometrics metho...
Despite numerous efforts, developing an authentication scheme that offers strong security while offe...
Authentication is required in stored database systems so that only authorized users can access the d...
Immersive Virtual Reality (IVR) is a growing 3D environment, where social and commercial application...
The most common computer authentication method is to use text usernames and passwords which have var...
Authentication of any system means providing a security to that system. There are number of authenti...
In today’s world, security is important aspect in day to day life .So, everyone used various ways fo...
Current authentication systems suffer from many weaknesses. Textual passwords are common. However, u...
Existing authentication systems is suffering with many weaknesses. In general, textual passwords are...
Abstract- In today’s world, security is important aspect in day to day life.So, everyone used variou...
In today’s world, security is important aspect in day to day life .So, everyone used various ways fo...
In this paper we describe how to implement 3D password. As it is free from textual password as well ...
The purpose of this paper is increasing the safety house and avoiding the weakness of typical word. ...
Authentication is one of the most basic process to provide security to any resource and application ...
Cloud computing is drastically growing technology which provides an on-demand software, hardware, in...
For the verification of authorized users in computer systems, various text based or biometrics metho...
Despite numerous efforts, developing an authentication scheme that offers strong security while offe...
Authentication is required in stored database systems so that only authorized users can access the d...
Immersive Virtual Reality (IVR) is a growing 3D environment, where social and commercial application...
The most common computer authentication method is to use text usernames and passwords which have var...