SlideShare une entreprise Scribd logo
1  sur  35
INTRO
Introduction
AGENDA
Explanation of status
about project with sub projects
as well as
sub modules with their
interaction & interconnections
with each other for
computing & managing
PURPOSE
Purpose of a Project
AGENDA
Provide High Security
to user by using
multilayer authentication system
in local , Network & Cloud
Systems On
GPU enabled Devices
PLATFORM
Platform & Environment
AGENDA
Platform as computer system
with HPC capability with help of
GPUs
Need of Smart I/O Devices ,
Smart Devices for Interaction
SURVEY
Survey of Research Material
AGENDA
Research Papers
Research Websites
Technical Conferences
Technical Forums
International Journals
Project Guide
Personal Experience
Imagination & Hypothesis
Timeline & Grant Chart
AGENDA
Project Work flow
throughout 1st & 2nd semester
With Process modules
& planning of
publishing research Papers
as well as
day by day project
progress tracking
TIMELINE
Results & Charts
AGENDA
Obtained & proposed results
• Security
• Optimization
• User Interface
• Usability
• Compare Past Authentication
RESULTS
Any Suggestions
AGENDA
Waiting For
• Suggestions
• Guidance
• Questions
• Queries
Any else …!!
ANY
“What You Know” Knowledge
“What You Have” Hard/Soft
“What You Are" Biometric
"What You Can " Intelligence
"What You Recognize" Recognition
HUMAN
AUTH
TECHNIQUES
“What You Are”
“MARUTI”
* PASSWORD *
* GESTURE *
* PATH *
* CHALLENGE RESPONSE *
* TOKENS *
* PASS PHRASE *
* PIN *
* BODY PRINT *
* RETINAL PATTERN *
* DNA SEQUENCE *
* FACE*
* VOICE *
* EYE *
* PALM & THUMB *
* ARTIFICIAL INTELLIGENCE ANSWERS *
* MEMORY INTELIGENCE *
* COMPLEX SOLUTIONS *
* CHALLENGE RESPONSE *
* CALL UP *
* THINK BACK SYSTEM WORKING*
* OBJECT *
* IMAGE*
* PATTERN *
* PATH / WAY *
* SOUND / AUDEO *
* ANIMATION / VIDEO *
* SYSTEM *
Computer Security
Prevention and Detection of unauthorized actions by users
For What..??
* Confidentiality *
* Availability *
* Non-repudiation *
* Accountability *
* Security systems *
The Platforms for which Security will provide
Mostly Web Applications & web Sites
AS
* Forums*
* Social Networking*
* Search Engines*
* Cloud Applications*
* Server Applications Systems*
* Mailing & Messaging *
Survey for MARUTI requires different
survey Material
AS
* Research Papers & Websites *
* Technical Conferences & Forums*
* International Journals *
* Project Guide*
* Personal Experience *
* Imagination & Hypothesis *
Survey for Human Identification System
AS
* Research Papers & Websites *
* Technical Conferences & Forums*
* International Journals *
* Project Guide*
* Personal Experience *
* Imagination & Hypothesis *
* Distinguishing between Humans and Robots on the Web
* Roles in information security : A survey and classification of the research area
* Safeguards and security survey and self-assessment toolkit
* Building Robust Authentication Systems With Activity-Based Personal Questions
* Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs
* Modeling Human Behavior for Defense against Flash-Crowd Attacks
* Cyber Security Using Arabic CAPTCHA Scheme
* Distinguishing Humans from Bots in Web Search Logs
* Some thoughts about writing a survey paper
SEARCH
SECURITY
HEM
BLOG
Project Guide
Dr. R. C. Thool
Personal Experience
Crawling Through Web/Papers/Books/Guide
Imagination & Hypothesis
Increase in secureness in user authentication system with high
performance & User friendly
December JanuaryNovember February
Trial & error for
Paper design
Planning For
different
Conferences
Tracking
Optimize
results
Testing
Planning for
GTC 2013
Result Merging
of all Systems
Publish / reedit
Paper
Compare
Papers & results
2nd
Presentation
MayAprilMarch June
Future
Planning
Final
Transaction
with paper
Combined
Result
FINAL
Presentation
Finalize results
with
Optimization
The Ideas Creation about user authenticating Schemes
AS
* Merging of different authentication Schemes*
* Overlapping authentication systems *
* Use of GPU to improve performance as GPGPU*
* Creation of Scheme Environment using Parallelism*
* Achieve parallelism using CUDA/OpenCL*
* Optimize use of available Hardware*
Waiting For
Suggestions …!!
Guidance …!!
Questions …!!
Queries …!!
Any else …!!

Contenu connexe

Similaire à Hem second presentation

Web das coisas
Web das coisasWeb das coisas
Web das coisasCentro Web
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudWSO2
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud SystemsDevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud SystemsHong-Linh Truong
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingOpen Interconnect Consortium
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
OGCE SciDAC2010 Tutorial
OGCE SciDAC2010 TutorialOGCE SciDAC2010 Tutorial
OGCE SciDAC2010 Tutorialmarpierc
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical SystemsBob Marcus
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalJohn Soldatos
 
Edge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AITEdge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AIThubraum IoT Academy
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jIvan Zoratti
 
Internet of Things & Co.
Internet of Things & Co.Internet of Things & Co.
Internet of Things & Co.Damir Dobric
 
Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...Eamonn O'Brien-Strain
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Amélie Gyrard
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application PatternsDaniel Nüst
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16Claire Rowland
 
Some Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information TechnologySome Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information TechnologyFranz-Josef Behr
 

Similaire à Hem second presentation (20)

Web das coisas
Web das coisasWeb das coisas
Web das coisas
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud SystemsDevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
OGCE SciDAC2010 Tutorial
OGCE SciDAC2010 TutorialOGCE SciDAC2010 Tutorial
OGCE SciDAC2010 Tutorial
 
Metadata - What is Unseen
Metadata - What is UnseenMetadata - What is Unseen
Metadata - What is Unseen
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
 
Edge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AITEdge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AIT
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
 
Internet of Things & Co.
Internet of Things & Co.Internet of Things & Co.
Internet of Things & Co.
 
Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application Patterns
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16
 
Some Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information TechnologySome Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information Technology
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Hem second presentation

  • 1.
  • 2.
  • 3. INTRO Introduction AGENDA Explanation of status about project with sub projects as well as sub modules with their interaction & interconnections with each other for computing & managing
  • 4. PURPOSE Purpose of a Project AGENDA Provide High Security to user by using multilayer authentication system in local , Network & Cloud Systems On GPU enabled Devices
  • 5. PLATFORM Platform & Environment AGENDA Platform as computer system with HPC capability with help of GPUs Need of Smart I/O Devices , Smart Devices for Interaction
  • 6. SURVEY Survey of Research Material AGENDA Research Papers Research Websites Technical Conferences Technical Forums International Journals Project Guide Personal Experience Imagination & Hypothesis
  • 7. Timeline & Grant Chart AGENDA Project Work flow throughout 1st & 2nd semester With Process modules & planning of publishing research Papers as well as day by day project progress tracking TIMELINE
  • 8. Results & Charts AGENDA Obtained & proposed results • Security • Optimization • User Interface • Usability • Compare Past Authentication RESULTS
  • 9. Any Suggestions AGENDA Waiting For • Suggestions • Guidance • Questions • Queries Any else …!! ANY
  • 10.
  • 11. “What You Know” Knowledge “What You Have” Hard/Soft “What You Are" Biometric "What You Can " Intelligence "What You Recognize" Recognition HUMAN AUTH TECHNIQUES
  • 14. * PASSWORD * * GESTURE * * PATH * * CHALLENGE RESPONSE * * TOKENS * * PASS PHRASE * * PIN *
  • 15. * BODY PRINT * * RETINAL PATTERN * * DNA SEQUENCE * * FACE* * VOICE * * EYE * * PALM & THUMB *
  • 16. * ARTIFICIAL INTELLIGENCE ANSWERS * * MEMORY INTELIGENCE * * COMPLEX SOLUTIONS * * CHALLENGE RESPONSE * * CALL UP * * THINK BACK SYSTEM WORKING*
  • 17. * OBJECT * * IMAGE* * PATTERN * * PATH / WAY * * SOUND / AUDEO * * ANIMATION / VIDEO * * SYSTEM *
  • 18.
  • 19. Computer Security Prevention and Detection of unauthorized actions by users For What..?? * Confidentiality * * Availability * * Non-repudiation * * Accountability * * Security systems *
  • 20.
  • 21. The Platforms for which Security will provide Mostly Web Applications & web Sites AS * Forums* * Social Networking* * Search Engines* * Cloud Applications* * Server Applications Systems* * Mailing & Messaging *
  • 22.
  • 23. Survey for MARUTI requires different survey Material AS * Research Papers & Websites * * Technical Conferences & Forums* * International Journals * * Project Guide* * Personal Experience * * Imagination & Hypothesis *
  • 24. Survey for Human Identification System AS * Research Papers & Websites * * Technical Conferences & Forums* * International Journals * * Project Guide* * Personal Experience * * Imagination & Hypothesis *
  • 25. * Distinguishing between Humans and Robots on the Web * Roles in information security : A survey and classification of the research area * Safeguards and security survey and self-assessment toolkit * Building Robust Authentication Systems With Activity-Based Personal Questions * Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs * Modeling Human Behavior for Defense against Flash-Crowd Attacks * Cyber Security Using Arabic CAPTCHA Scheme * Distinguishing Humans from Bots in Web Search Logs * Some thoughts about writing a survey paper
  • 28. Project Guide Dr. R. C. Thool Personal Experience Crawling Through Web/Papers/Books/Guide Imagination & Hypothesis Increase in secureness in user authentication system with high performance & User friendly
  • 29.
  • 30. December JanuaryNovember February Trial & error for Paper design Planning For different Conferences Tracking Optimize results Testing Planning for GTC 2013 Result Merging of all Systems Publish / reedit Paper Compare Papers & results 2nd Presentation
  • 32.
  • 33. The Ideas Creation about user authenticating Schemes AS * Merging of different authentication Schemes* * Overlapping authentication systems * * Use of GPU to improve performance as GPGPU* * Creation of Scheme Environment using Parallelism* * Achieve parallelism using CUDA/OpenCL* * Optimize use of available Hardware*
  • 34.
  • 35. Waiting For Suggestions …!! Guidance …!! Questions …!! Queries …!! Any else …!!

Notes de l'éditeur

  1. INTRODUCTIONPURPOSEPLATFORMSURVEYTIMEPLANRESULTSSUGGESTIONS
  2. “What You Know” Knowledge“What You Have” Hard/Soft piece“What You Are" Biometric"What You Can " Intelligence"What You Recall" Recognition
  3. Transition effect for timeline, slide 2(Basic)Tip: This slide is the second slide in a three-slide sequence.To reproduce the effects on this slide, do the following:In the Slides and Outline pane, right-click the previous slide (“Transition effect for timeline, slide 1”) and click Duplicate Slide.Select each of the three text boxes on the slide and change the text.Select the chevron shape on the slide. Drag the left sizing handle to the left so that the chevron shape extends past the left edge of the slide.
  4. Transition effect for timeline, slide 3(Basic)Tip: This slide is the second slide in a three-slide sequence.To reproduce the effects on this slide, do the following:In the Slides and Outline pane, right-click the previous slide (“Transition effect for timeline, slide 2”) and click Duplicate Slide.Select each of the three text boxes on the slide and change the text.Select the chevron shape on the slide. Drag the right sizing handle to the left so that the right edge of the chevron shape is 0.5” from the right edge of the slide.