SlideShare a Scribd company logo
1 of 35
INTRO
Introduction
AGENDA
Explanation of status
about project with sub projects
as well as
sub modules with their
interaction & interconnections
with each other for
computing & managing
PURPOSE
Purpose of a Project
AGENDA
Provide High Security
to user by using
multilayer authentication system
in local , Network & Cloud
Systems On
GPU enabled Devices
PLATFORM
Platform & Environment
AGENDA
Platform as computer system
with HPC capability with help of
GPUs
Need of Smart I/O Devices ,
Smart Devices for Interaction
SURVEY
Survey of Research Material
AGENDA
Research Papers
Research Websites
Technical Conferences
Technical Forums
International Journals
Project Guide
Personal Experience
Imagination & Hypothesis
Timeline & Grant Chart
AGENDA
Project Work flow
throughout 1st & 2nd semester
With Process modules
& planning of
publishing research Papers
as well as
day by day project
progress tracking
TIMELINE
Results & Charts
AGENDA
Obtained & proposed results
• Security
• Optimization
• User Interface
• Usability
• Compare Past Authentication
RESULTS
Any Suggestions
AGENDA
Waiting For
• Suggestions
• Guidance
• Questions
• Queries
Any else …!!
ANY
“What You Know” Knowledge
“What You Have” Hard/Soft
“What You Are" Biometric
"What You Can " Intelligence
"What You Recognize" Recognition
HUMAN
AUTH
TECHNIQUES
“What You Are”
“MARUTI”
* PASSWORD *
* GESTURE *
* PATH *
* CHALLENGE RESPONSE *
* TOKENS *
* PASS PHRASE *
* PIN *
* BODY PRINT *
* RETINAL PATTERN *
* DNA SEQUENCE *
* FACE*
* VOICE *
* EYE *
* PALM & THUMB *
* ARTIFICIAL INTELLIGENCE ANSWERS *
* MEMORY INTELIGENCE *
* COMPLEX SOLUTIONS *
* CHALLENGE RESPONSE *
* CALL UP *
* THINK BACK SYSTEM WORKING*
* OBJECT *
* IMAGE*
* PATTERN *
* PATH / WAY *
* SOUND / AUDEO *
* ANIMATION / VIDEO *
* SYSTEM *
Computer Security
Prevention and Detection of unauthorized actions by users
For What..??
* Confidentiality *
* Availability *
* Non-repudiation *
* Accountability *
* Security systems *
The Platforms for which Security will provide
Mostly Web Applications & web Sites
AS
* Forums*
* Social Networking*
* Search Engines*
* Cloud Applications*
* Server Applications Systems*
* Mailing & Messaging *
Survey for MARUTI requires different
survey Material
AS
* Research Papers & Websites *
* Technical Conferences & Forums*
* International Journals *
* Project Guide*
* Personal Experience *
* Imagination & Hypothesis *
Survey for Human Identification System
AS
* Research Papers & Websites *
* Technical Conferences & Forums*
* International Journals *
* Project Guide*
* Personal Experience *
* Imagination & Hypothesis *
* Distinguishing between Humans and Robots on the Web
* Roles in information security : A survey and classification of the research area
* Safeguards and security survey and self-assessment toolkit
* Building Robust Authentication Systems With Activity-Based Personal Questions
* Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs
* Modeling Human Behavior for Defense against Flash-Crowd Attacks
* Cyber Security Using Arabic CAPTCHA Scheme
* Distinguishing Humans from Bots in Web Search Logs
* Some thoughts about writing a survey paper
SEARCH
SECURITY
HEM
BLOG
Project Guide
Dr. R. C. Thool
Personal Experience
Crawling Through Web/Papers/Books/Guide
Imagination & Hypothesis
Increase in secureness in user authentication system with high
performance & User friendly
December JanuaryNovember February
Trial & error for
Paper design
Planning For
different
Conferences
Tracking
Optimize
results
Testing
Planning for
GTC 2013
Result Merging
of all Systems
Publish / reedit
Paper
Compare
Papers & results
2nd
Presentation
MayAprilMarch June
Future
Planning
Final
Transaction
with paper
Combined
Result
FINAL
Presentation
Finalize results
with
Optimization
The Ideas Creation about user authenticating Schemes
AS
* Merging of different authentication Schemes*
* Overlapping authentication systems *
* Use of GPU to improve performance as GPGPU*
* Creation of Scheme Environment using Parallelism*
* Achieve parallelism using CUDA/OpenCL*
* Optimize use of available Hardware*
Waiting For
Suggestions …!!
Guidance …!!
Questions …!!
Queries …!!
Any else …!!

More Related Content

Similar to Hem second presentation

Web das coisas
Web das coisasWeb das coisas
Web das coisasCentro Web
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudWSO2
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud SystemsDevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud SystemsHong-Linh Truong
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingOpen Interconnect Consortium
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
OGCE SciDAC2010 Tutorial
OGCE SciDAC2010 TutorialOGCE SciDAC2010 Tutorial
OGCE SciDAC2010 Tutorialmarpierc
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical SystemsBob Marcus
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalJohn Soldatos
 
Edge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AITEdge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AIThubraum IoT Academy
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jIvan Zoratti
 
Internet of Things & Co.
Internet of Things & Co.Internet of Things & Co.
Internet of Things & Co.Damir Dobric
 
Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...Eamonn O'Brien-Strain
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Amélie Gyrard
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application PatternsDaniel Nüst
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16Claire Rowland
 
Some Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information TechnologySome Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information TechnologyFranz-Josef Behr
 

Similar to Hem second presentation (20)

Web das coisas
Web das coisasWeb das coisas
Web das coisas
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud SystemsDevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
OGCE SciDAC2010 Tutorial
OGCE SciDAC2010 TutorialOGCE SciDAC2010 Tutorial
OGCE SciDAC2010 Tutorial
 
Metadata - What is Unseen
Metadata - What is UnseenMetadata - What is Unseen
Metadata - What is Unseen
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
 
Edge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AITEdge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AIT
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
 
Internet of Things & Co.
Internet of Things & Co.Internet of Things & Co.
Internet of Things & Co.
 
Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application Patterns
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16
 
Some Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information TechnologySome Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information Technology
 

Recently uploaded

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Hem second presentation

  • 1.
  • 2.
  • 3. INTRO Introduction AGENDA Explanation of status about project with sub projects as well as sub modules with their interaction & interconnections with each other for computing & managing
  • 4. PURPOSE Purpose of a Project AGENDA Provide High Security to user by using multilayer authentication system in local , Network & Cloud Systems On GPU enabled Devices
  • 5. PLATFORM Platform & Environment AGENDA Platform as computer system with HPC capability with help of GPUs Need of Smart I/O Devices , Smart Devices for Interaction
  • 6. SURVEY Survey of Research Material AGENDA Research Papers Research Websites Technical Conferences Technical Forums International Journals Project Guide Personal Experience Imagination & Hypothesis
  • 7. Timeline & Grant Chart AGENDA Project Work flow throughout 1st & 2nd semester With Process modules & planning of publishing research Papers as well as day by day project progress tracking TIMELINE
  • 8. Results & Charts AGENDA Obtained & proposed results • Security • Optimization • User Interface • Usability • Compare Past Authentication RESULTS
  • 9. Any Suggestions AGENDA Waiting For • Suggestions • Guidance • Questions • Queries Any else …!! ANY
  • 10.
  • 11. “What You Know” Knowledge “What You Have” Hard/Soft “What You Are" Biometric "What You Can " Intelligence "What You Recognize" Recognition HUMAN AUTH TECHNIQUES
  • 14. * PASSWORD * * GESTURE * * PATH * * CHALLENGE RESPONSE * * TOKENS * * PASS PHRASE * * PIN *
  • 15. * BODY PRINT * * RETINAL PATTERN * * DNA SEQUENCE * * FACE* * VOICE * * EYE * * PALM & THUMB *
  • 16. * ARTIFICIAL INTELLIGENCE ANSWERS * * MEMORY INTELIGENCE * * COMPLEX SOLUTIONS * * CHALLENGE RESPONSE * * CALL UP * * THINK BACK SYSTEM WORKING*
  • 17. * OBJECT * * IMAGE* * PATTERN * * PATH / WAY * * SOUND / AUDEO * * ANIMATION / VIDEO * * SYSTEM *
  • 18.
  • 19. Computer Security Prevention and Detection of unauthorized actions by users For What..?? * Confidentiality * * Availability * * Non-repudiation * * Accountability * * Security systems *
  • 20.
  • 21. The Platforms for which Security will provide Mostly Web Applications & web Sites AS * Forums* * Social Networking* * Search Engines* * Cloud Applications* * Server Applications Systems* * Mailing & Messaging *
  • 22.
  • 23. Survey for MARUTI requires different survey Material AS * Research Papers & Websites * * Technical Conferences & Forums* * International Journals * * Project Guide* * Personal Experience * * Imagination & Hypothesis *
  • 24. Survey for Human Identification System AS * Research Papers & Websites * * Technical Conferences & Forums* * International Journals * * Project Guide* * Personal Experience * * Imagination & Hypothesis *
  • 25. * Distinguishing between Humans and Robots on the Web * Roles in information security : A survey and classification of the research area * Safeguards and security survey and self-assessment toolkit * Building Robust Authentication Systems With Activity-Based Personal Questions * Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs * Modeling Human Behavior for Defense against Flash-Crowd Attacks * Cyber Security Using Arabic CAPTCHA Scheme * Distinguishing Humans from Bots in Web Search Logs * Some thoughts about writing a survey paper
  • 28. Project Guide Dr. R. C. Thool Personal Experience Crawling Through Web/Papers/Books/Guide Imagination & Hypothesis Increase in secureness in user authentication system with high performance & User friendly
  • 29.
  • 30. December JanuaryNovember February Trial & error for Paper design Planning For different Conferences Tracking Optimize results Testing Planning for GTC 2013 Result Merging of all Systems Publish / reedit Paper Compare Papers & results 2nd Presentation
  • 32.
  • 33. The Ideas Creation about user authenticating Schemes AS * Merging of different authentication Schemes* * Overlapping authentication systems * * Use of GPU to improve performance as GPGPU* * Creation of Scheme Environment using Parallelism* * Achieve parallelism using CUDA/OpenCL* * Optimize use of available Hardware*
  • 34.
  • 35. Waiting For Suggestions …!! Guidance …!! Questions …!! Queries …!! Any else …!!

Editor's Notes

  1. INTRODUCTIONPURPOSEPLATFORMSURVEYTIMEPLANRESULTSSUGGESTIONS
  2. “What You Know” Knowledge“What You Have” Hard/Soft piece“What You Are" Biometric"What You Can " Intelligence"What You Recall" Recognition
  3. Transition effect for timeline, slide 2(Basic)Tip: This slide is the second slide in a three-slide sequence.To reproduce the effects on this slide, do the following:In the Slides and Outline pane, right-click the previous slide (“Transition effect for timeline, slide 1”) and click Duplicate Slide.Select each of the three text boxes on the slide and change the text.Select the chevron shape on the slide. Drag the left sizing handle to the left so that the chevron shape extends past the left edge of the slide.
  4. Transition effect for timeline, slide 3(Basic)Tip: This slide is the second slide in a three-slide sequence.To reproduce the effects on this slide, do the following:In the Slides and Outline pane, right-click the previous slide (“Transition effect for timeline, slide 2”) and click Duplicate Slide.Select each of the three text boxes on the slide and change the text.Select the chevron shape on the slide. Drag the right sizing handle to the left so that the right edge of the chevron shape is 0.5” from the right edge of the slide.