Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

Library Philosophy and Practice (e-journal)

Authentication

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Engineering

A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R. Mar 2021

A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R.

Library Philosophy and Practice (e-journal)

Access Control is mentioned to as the imprisonment of particular activities of an individual to carry out an action. Cloud storing similar to any other untrusted surroundings wants the capacity to protect the shared data. The one of the apparatus of access mechanism is ciphertext-policy attribute-based encryption system over and done with dynamic characteristics. With a blockchain based distributed ledger, the scheme offers immutable log of whole significant safety events, for example key generation, change or revocation, access policy assignment, access request etc. Number of different problems similar to single point of failure, security and privacy etc. were targeted through …


Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite Jan 2021

Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite

Library Philosophy and Practice (e-journal)

Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …


Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade Oct 2020

Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade

Library Philosophy and Practice (e-journal)

Authentication is an essential step for giving access to resources to authorized individuals and prevent leakage of confidential information. The traditional authentication systems like a pin, card, a password could not differentiate among the authorized users and fakers who have an illegal access to the system. Traditional authentication technique never alerts about the unwanted access to the system. The device that allows the automatic identification of an individual is known as a biometric system. It is not required to remember a password, card, and pin code in the Bio-metric system. Numerous biometric characteristics like the fingerprint, iris, palm print, face …