Image based authentication with secure key exchange mechanism in cloud
Citations
35 citations
7 citations
Cites methods from "Image based authentication with sec..."
...Ruchi Chaudhary [11], Proposed system in which user is authenticated by CSP using the image based authentication scheme....
[...]
...Author Mr. Anurag Singh Tomar, Mr. Garurav Kumar, Mrs. Ruchi Chaudhary [11], Proposed system in which user is authenticated by CSP using the image based authentication scheme....
[...]
4 citations
1 citations
1 citations
Additional excerpts
...Pattern ID (j) (1) (2,4,6) (2) - – (0,3) (7) (0) (2,5) (5) Table 2....
[...]
References
141 citations
"Image based authentication with sec..." refers methods in this paper
...During accessing of web page from cloud or in online transaction the device will send query to Data authentication consumer, after that query will be forwarded to authentication engine [3] along with list of policy, authentication engine extract data and ask device to provide the value of parameters after that based on parameter value engine will respond to device about authentication....
[...]
21 citations
9 citations
"Image based authentication with sec..." refers background in this paper
...Intrusion detection system [2] can be used to provide security while accessing data from cloud....
[...]
7 citations
"Image based authentication with sec..." refers background in this paper
...First user will generate key with help of primitive root [4,5,6] of group and by choosing some random value after that user will send some information related to key and with help of that service provider can compute the key....
[...]
4 citations
"Image based authentication with sec..." refers background in this paper
...First user will generate key with help of primitive root [4,5,6] of group and by choosing some random value after that user will send some information related to key and with help of that service provider can compute the key....
[...]