INTROIntroductionAGENDAExplanation of statusabout project with sub projectsas well assub modules with theirinteraction & i...
PURPOSEPurpose of a ProjectAGENDAProvide High Securityto user by usingmultilayer authentication systemin local , Network &...
PLATFORMPlatform & EnvironmentAGENDAPlatform as computer systemwith HPC capability with help ofGPUsNeed of Smart I/O Devic...
SURVEYSurvey of Research MaterialAGENDAResearch PapersResearch WebsitesTechnical ConferencesTechnical ForumsInternational ...
Timeline & Grant ChartAGENDAProject Work flowthroughout 1st & 2nd semesterWith Process modules& planning ofpublishing rese...
Results & ChartsAGENDAObtained & proposed results• Security• Optimization• User Interface• Usability• Compare Past Authent...
Any SuggestionsAGENDAWaiting For• Suggestions• Guidance• Questions• QueriesAny else …!!ANY
“What You Know” Knowledge“What You Have” Hard/Soft“What You Are" Biometric"What You Can " Intelligence"What You Recognize"...
“What You Are”
“MARUTI”
* PASSWORD ** GESTURE ** PATH ** CHALLENGE RESPONSE ** TOKENS ** PASS PHRASE ** PIN *
* BODY PRINT ** RETINAL PATTERN ** DNA SEQUENCE ** FACE** VOICE ** EYE ** PALM & THUMB *
* ARTIFICIAL INTELLIGENCE ANSWERS ** MEMORY INTELIGENCE ** COMPLEX SOLUTIONS ** CHALLENGE RESPONSE ** CALL UP ** THINK BAC...
* OBJECT ** IMAGE** PATTERN ** PATH / WAY ** SOUND / AUDEO ** ANIMATION / VIDEO ** SYSTEM *
Computer SecurityPrevention and Detection of unauthorized actions by usersFor What..??* Confidentiality ** Availability **...
The Platforms for which Security will provideMostly Web Applications & web SitesAS* Forums** Social Networking** Search En...
Survey for MARUTI requires differentsurvey MaterialAS* Research Papers & Websites ** Technical Conferences & Forums** Inte...
Survey for Human Identification SystemAS* Research Papers & Websites ** Technical Conferences & Forums** International Jou...
* Distinguishing between Humans and Robots on the Web* Roles in information security : A survey and classification of the ...
SEARCHSECURITY
HEMBLOG
Project GuideDr. R. C. ThoolPersonal ExperienceCrawling Through Web/Papers/Books/GuideImagination & HypothesisIncrease in ...
December JanuaryNovember FebruaryTrial & error forPaper designPlanning FordifferentConferencesTrackingOptimizeresultsTesti...
MayAprilMarch JuneFuturePlanningFinalTransactionwith paperCombinedResultFINALPresentationFinalize resultswithOptimization
The Ideas Creation about user authenticating SchemesAS* Merging of different authentication Schemes** Overlapping authenti...
Waiting ForSuggestions …!!Guidance …!!Questions …!!Queries …!!Any else …!!
Hem second presentation
Hem second presentation
Hem second presentation
Hem second presentation
Hem second presentation
Hem second presentation
Hem second presentation
Hem second presentation
Hem second presentation
Upcoming SlideShare
Loading in …5
×

Hem second presentation

180 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Hem second presentation

  1. 1. INTROIntroductionAGENDAExplanation of statusabout project with sub projectsas well assub modules with theirinteraction & interconnectionswith each other forcomputing & managing
  2. 2. PURPOSEPurpose of a ProjectAGENDAProvide High Securityto user by usingmultilayer authentication systemin local , Network & CloudSystems OnGPU enabled Devices
  3. 3. PLATFORMPlatform & EnvironmentAGENDAPlatform as computer systemwith HPC capability with help ofGPUsNeed of Smart I/O Devices ,Smart Devices for Interaction
  4. 4. SURVEYSurvey of Research MaterialAGENDAResearch PapersResearch WebsitesTechnical ConferencesTechnical ForumsInternational JournalsProject GuidePersonal ExperienceImagination & Hypothesis
  5. 5. Timeline & Grant ChartAGENDAProject Work flowthroughout 1st & 2nd semesterWith Process modules& planning ofpublishing research Papersas well asday by day projectprogress trackingTIMELINE
  6. 6. Results & ChartsAGENDAObtained & proposed results• Security• Optimization• User Interface• Usability• Compare Past AuthenticationRESULTS
  7. 7. Any SuggestionsAGENDAWaiting For• Suggestions• Guidance• Questions• QueriesAny else …!!ANY
  8. 8. “What You Know” Knowledge“What You Have” Hard/Soft“What You Are" Biometric"What You Can " Intelligence"What You Recognize" RecognitionHUMANAUTHTECHNIQUES
  9. 9. “What You Are”
  10. 10. “MARUTI”
  11. 11. * PASSWORD ** GESTURE ** PATH ** CHALLENGE RESPONSE ** TOKENS ** PASS PHRASE ** PIN *
  12. 12. * BODY PRINT ** RETINAL PATTERN ** DNA SEQUENCE ** FACE** VOICE ** EYE ** PALM & THUMB *
  13. 13. * ARTIFICIAL INTELLIGENCE ANSWERS ** MEMORY INTELIGENCE ** COMPLEX SOLUTIONS ** CHALLENGE RESPONSE ** CALL UP ** THINK BACK SYSTEM WORKING*
  14. 14. * OBJECT ** IMAGE** PATTERN ** PATH / WAY ** SOUND / AUDEO ** ANIMATION / VIDEO ** SYSTEM *
  15. 15. Computer SecurityPrevention and Detection of unauthorized actions by usersFor What..??* Confidentiality ** Availability ** Non-repudiation ** Accountability ** Security systems *
  16. 16. The Platforms for which Security will provideMostly Web Applications & web SitesAS* Forums** Social Networking** Search Engines** Cloud Applications** Server Applications Systems** Mailing & Messaging *
  17. 17. Survey for MARUTI requires differentsurvey MaterialAS* Research Papers & Websites ** Technical Conferences & Forums** International Journals ** Project Guide** Personal Experience ** Imagination & Hypothesis *
  18. 18. Survey for Human Identification SystemAS* Research Papers & Websites ** Technical Conferences & Forums** International Journals ** Project Guide** Personal Experience ** Imagination & Hypothesis *
  19. 19. * Distinguishing between Humans and Robots on the Web* Roles in information security : A survey and classification of the research area* Safeguards and security survey and self-assessment toolkit* Building Robust Authentication Systems With Activity-Based Personal Questions* Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs* Modeling Human Behavior for Defense against Flash-Crowd Attacks* Cyber Security Using Arabic CAPTCHA Scheme* Distinguishing Humans from Bots in Web Search Logs* Some thoughts about writing a survey paper
  20. 20. SEARCHSECURITY
  21. 21. HEMBLOG
  22. 22. Project GuideDr. R. C. ThoolPersonal ExperienceCrawling Through Web/Papers/Books/GuideImagination & HypothesisIncrease in secureness in user authentication system with highperformance & User friendly
  23. 23. December JanuaryNovember FebruaryTrial & error forPaper designPlanning FordifferentConferencesTrackingOptimizeresultsTestingPlanning forGTC 2013Result Mergingof all SystemsPublish / reeditPaperComparePapers & results2ndPresentation
  24. 24. MayAprilMarch JuneFuturePlanningFinalTransactionwith paperCombinedResultFINALPresentationFinalize resultswithOptimization
  25. 25. The Ideas Creation about user authenticating SchemesAS* Merging of different authentication Schemes** Overlapping authentication systems ** Use of GPU to improve performance as GPGPU** Creation of Scheme Environment using Parallelism** Achieve parallelism using CUDA/OpenCL** Optimize use of available Hardware*
  26. 26. Waiting ForSuggestions …!!Guidance …!!Questions …!!Queries …!!Any else …!!

×