SlideShare a Scribd company logo
1 of 26
Download to read offline
By:
Jaya Sinha (115415)
Oindrila Gupta (115416)
CONTENTS
 Introduction
 Three Factors of Authentication
 Existing Authentication Techniques
 Drawbacks of Existing Authentication Schemes
 3D Password Scheme
 3D Password Selection
 Designing of a 3D Virtual Environment
 Advantages of 3D Passwords
 Applications of 3D Passwords
 Attacks and Counter­Measures
 Conclusion
INTRODUCTION
Authentication  is  any  protocol  or 
process  that  permits  one  entity  to 
establish  the  identity  of  another 
entity.
➢

In  other  words,  authentication  is 
the  process  of  determining  whether 
someone or something is, in fact, who 
or what it is declared to be.
✔
Three Factors of Authentication
 1. Knowledge Based: Something you     
      know like PASSWORD, PIN

 2. Token Based: Something you possess  
      like KEYS, PASSPORT, SMART 
CARD

 3. Biometrics: Something you are like       
      FINGERPRINT, FACE, IRIS
Existing Authentication Techniques

➔

Textual Password: Recall 

Based
➔

Graphical Password: 

Recall Based + Recognition 
Based (Biometrics)
Drawbacks of Existing
Authentication Schemes
Drawbacks of Textual Passwords
Textual Passwords should be easy to 
remember, but at the same time, difficult to 
guess
●

Full password space for 8 characters, 
consisting of both numbers and characters, 
is 2*(10^14)
●

A research showed that 25% of the 
passwords out of 15,000 users could be 
guessed correctly using brute force 
dictionary
●
Drawbacks of Graphical Passwords
Graphical Passwords can be easily recorded as 
these schemes take a long time
●

The main drawback of using biometric is its 
intrusiveness upon a user's personal 
characteristics which are liable to change under 
certain situations. For example, a bruised finger 
will lead to an inconsistency in fingerprint 
pattern
●

They require special scanning device to 
authenticate the user which is not acceptable 
for remote and internet users
●
3D PASSWORD to the rescue...
3D PASSWORD SCHEME
The 3D Password scheme is a new     
  authentication scheme that 
combines
  RECOGNITION
         + RECALL
                 + TOKENS
                         + BIOMETRIC
in one authentication system
➢
The 3D password presents a virtual 
environment containing various virtual 
objects
➢

The user walks through the 
environment and interacts with 
the objects
➢

The 3D Password is simply the 
combination and sequence of 
user interactions that occur in the 
3D environment
➢
The 3D password can combine the existing authentication 
schemes such as textual passwords, graphical passwords, 
and various types of biometrics into a 3D virtual 
environment. The design of the 3D virtual environment 
and the type of objects selected determine the 3D 
password key space.
➢
3D PASSWORD SELECTION
Virtual objects can be any object       
that we encounter in real life:
a computer on which the user can type

✔

a fingerprint reader that requires the   
 user’s fingerprint
✔

a biometrical recognition device

✔

a paper or white board that a user can 
 write, sign, or draw on
✔

an automated teller machine (ATM)     
 that requires a token
✔
✔

a light that can be switched on/off

a television or radio where channels    
 can be selected
✔

✔

a stapler that can be punched

✔

a car that can be driven

a book that can be moved from one      
  place to another
✔

✔

any graphical password scheme

✔

any real­life object

✔

any upcoming authentication scheme
3D VIRTUAL ENVIRONMENT
Designing of a 3D Virtual Environment
Designing a well­studied 3­D virtual 
environment affects the usability, effectiveness, 
and acceptability of a 3­D password system. 
Therefore, the first step in building a 3­D 
password system is to design a 3­D environment 
that reflects the administration needs and the 
security requirements. The design of 3­D virtual 
environments should follow the following 
guidelines:
●

Real­life similarity: The prospective 3­D 

virtual environment should reflect what 
people are used to seeing in real life.
●

Object uniqueness and distinction: The 

design of the 3­D virtual environment 
should consider that every object should be 
distinguishable from other objects.

Three­dimensional virtual 
environment size: The size of a 3­D 
●

environment should be carefully studied as 
it can depict a space as focused as a single 
room (or office) or as vast as a city (or even 
the world).
Number of objects (items) and their 
types: Part of designing a 3­D virtual 
●

environment is determining the types of 
objects and how many objects should be 
placed in the environment. The types of 
objects reflect what kind of responses the 
object will have.
●

System importance: The 3­D virtual 

environment should consider what systems 
will be protected by a 3­D password.
ADVANTAGES OF 3D PASSWORDS
✔

Flexibility: 3D Passwords allow 

Multifactor Authentication
✔

Strength: This scenario provides 

almost unlimited possibilities of 
passwords
✔

Easy to memorize: Can be 

remembered in the form of a short story
✔

Respect of Privacy: Organizers can 

select authentication schemes that 
respect the privacy of the users
APPLICATIONS OF 3D 
PASSWORDS
Critical servers: Many large 

➢

organizations have critical servers that 
require very high security but are usually 
protected by a textual password. A 3­D 
password authentication proposes a 
sound replacement for a textual 
password. Moreover, entrances to such 
locations are usually protected by access 
cards and sometimes PIN numbers. 
Therefore, a 3­D password can be used to 
protect the entrance to such locations as well 
as protect the usage of such servers.
Airplanes and jetfighters: Because of 

➢

the possible threat of misusing airplanes 
and jetfighters for religious/political 
agendas, usage of such airplanes should be 
protected by a powerful authentication 
system.

Nuclear and military facilities: Such 

➢

facilities should be protected by the most 
powerful authentication systems. The 3­D 
password has a very large probable 
password space, and since it can contain 
token, biometrics, recognition, and 
knowledge based authentications in a 
single authentication system, it is a sound 
choice for high level security locations.
A small 3­D virtual 
environment can be used in 
many systems, including the 
following:
1) ATMs
2) personal digital assistants
3) desktop computers and       
         laptop logins
4) web authentication
ATTACKS AND COUNTER­MEASURES
Brute Force Attack: This attack is 

➢

very difficult because:
   1. It is very time consuming
   2. Attack is highly expensive

Well Studied Attack: This attack is 

➢

difficult because the attacker has to 
perform customized attack for different 
virtual environments.

Shoulder Surfing Attack: This 

➢

attack is comparatively more successful 
because the attacker uses camera to 
record the 3D Passwords of the users.
CONCLUSION
3D Password improves 
authentication.
✔

It is difficult to crack as there are 
no fixed number of steps or 
particular procedure.
✔

Added with biometrics and 
token verification, this schema 
becomes almost unbreakable.
✔
BIBLIOGRAPHY

http://en.wikipedia.org/wiki/3­D_Secure
http://www.slideshare.net
http://www.giac.org/cissp­papers/2.pdf
http://share.pdfonline.com/01906f50bd334cc688daf1
0648bb5d68/3d seminar report.htm
3D Password Scheme: A New Authentication Technique

More Related Content

What's hot

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by sureshsuresh5c2
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognitionPiyush Mittal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationShobha Rani
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationDhvani Shah
 
SRAVYA
SRAVYASRAVYA
SRAVYApvpsit
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 

What's hot (20)

3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d password
3d password3d password
3d password
 
3 d password
3 d password3 d password
3 d password
 
3 d password
3 d password 3 d password
3 d password
 
3 d password
3 d password3 d password
3 d password
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
3D password
3D password3D password
3D password
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 

Viewers also liked

3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakadkuldeepdhakad
 
Kuldeep ritika ppt on bokaro steel plant
Kuldeep ritika  ppt on bokaro steel plantKuldeep ritika  ppt on bokaro steel plant
Kuldeep ritika ppt on bokaro steel plant1996kuldeep
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMAswati singh
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)ASIM MIRZA
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final PresentationBrian_Elliott
 
A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...Marios Pitikakis
 
Recent technology in the field of computer science
Recent technology in the field of computer scienceRecent technology in the field of computer science
Recent technology in the field of computer scienceRamya SK
 
3d passwords
3d passwords3d passwords
3d passwordsshwetaag
 
Bokaro steel plant negotiation
Bokaro steel plant negotiationBokaro steel plant negotiation
Bokaro steel plant negotiationAyushi Gupta
 
Virtual stores the future of retail
Virtual stores the future of retailVirtual stores the future of retail
Virtual stores the future of retailBharat Bharadwaj
 

Viewers also liked (20)

3d password
3d password3d password
3d password
 
Competitive programming
Competitive  programmingCompetitive  programming
Competitive programming
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
Kuldeep ritika ppt on bokaro steel plant
Kuldeep ritika  ppt on bokaro steel plantKuldeep ritika  ppt on bokaro steel plant
Kuldeep ritika ppt on bokaro steel plant
 
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...
 
Recent technology in the field of computer science
Recent technology in the field of computer scienceRecent technology in the field of computer science
Recent technology in the field of computer science
 
3D printing
3D printing 3D printing
3D printing
 
3d passwords
3d passwords3d passwords
3d passwords
 
Iptv
IptvIptv
Iptv
 
Bokaro steel plant negotiation
Bokaro steel plant negotiationBokaro steel plant negotiation
Bokaro steel plant negotiation
 
Virtual stores the future of retail
Virtual stores the future of retailVirtual stores the future of retail
Virtual stores the future of retail
 
3D Password
3D Password3D Password
3D Password
 

Similar to 3D Password Scheme: A New Authentication Technique

Similar to 3D Password Scheme: A New Authentication Technique (20)

NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3d authentication
3d authentication3d authentication
3d authentication
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3D-PASSWORD SEMI
3D-PASSWORD SEMI3D-PASSWORD SEMI
3D-PASSWORD SEMI
 
3 d
3 d3 d
3 d
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
graphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdfgraphicalpswrdauth-130518230955-phpapp02.pdf
graphicalpswrdauth-130518230955-phpapp02.pdf
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted3dpswd 130320115940-phpapp01-converted
3dpswd 130320115940-phpapp01-converted
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3 d password
3 d password3 d password
3 d password
 
C0361419
C0361419C0361419
C0361419
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
 
3D password
3D password 3D password
3D password
 
3d password
3d  password3d  password
3d password
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

3D Password Scheme: A New Authentication Technique