METHODOLOGY OF SECURE AUTHENTICATION SCHEMES USING VIRTUAL ENVIRONMENT

  • Mrs.Sadhana Dhabalia, Mr. Kirit K Dhabalia

Abstract

It is the user’s decision to choose which kind of verification strategies will be a part of their 2-D secret word. This is accomplished through communicating just with the items that obtain data that the user  is agreeable in giving and overlooking the object’s that demand data that the user  favors not to give. For instance, if a thing demands an iris scan and the user isn’t happy in giving such data, the user basically abstains from collaborating with that thing. Besides, giving the user the opportunity of decision with respect to what sort of validation method will be a part of their 2-D secret word and given the huge number of object and things in nature, the quantity of conceivable 2-D passwords will increment. In this manner, it turns out to be considerably harder for the attacker to guess the user’s 2-D secret phrase.

Published
2019-12-25
How to Cite
Mrs.Sadhana Dhabalia, Mr. Kirit K Dhabalia. (2019). METHODOLOGY OF SECURE AUTHENTICATION SCHEMES USING VIRTUAL ENVIRONMENT. International Journal of Control and Automation, 12(6s), 54 - 58. Retrieved from http://sersc.org/journals/index.php/IJCA/article/view/8407