SlideShare a Scribd company logo
INTRO
Introduction
AGENDA
Explanation of status
about project with sub projects
as well as
sub modules with their
interaction & interconnections
with each other for
computing & managing
PURPOSE
Purpose of a Project
AGENDA
Provide High Security
to user by using
multilayer authentication system
in local , Network & Cloud
Systems On
GPU enabled Devices
PLATFORM
Platform & Environment
AGENDA
Platform as computer system
with HPC capability with help of
GPUs
Need of Smart I/O Devices ,
Smart Devices for Interaction
SURVEY
Survey of Research Material
AGENDA
Research Papers
Research Websites
Technical Conferences
Technical Forums
International Journals
Project Guide
Personal Experience
Imagination & Hypothesis
Timeline & Grant Chart
AGENDA
Project Work flow
throughout 1st & 2nd semester
With Process modules
& planning of
publishing research Papers
as well as
day by day project
progress tracking
TIMELINE
Results & Charts
AGENDA
Obtained & proposed results
• Security
• Optimization
• User Interface
• Usability
• Compare Past Authentication
RESULTS
Any Suggestions
AGENDA
Waiting For
• Suggestions
• Guidance
• Questions
• Queries
Any else …!!
ANY
“What You Know” Knowledge
“What You Have” Hard/Soft
“What You Are" Biometric
"What You Can " Intelligence
"What You Recognize" Recognition
HUMAN
AUTH
TECHNIQUES
“What You Are”
“MARUTI”
* PASSWORD *
* GESTURE *
* PATH *
* CHALLENGE RESPONSE *
* TOKENS *
* PASS PHRASE *
* PIN *
* BODY PRINT *
* RETINAL PATTERN *
* DNA SEQUENCE *
* FACE*
* VOICE *
* EYE *
* PALM & THUMB *
* ARTIFICIAL INTELLIGENCE ANSWERS *
* MEMORY INTELIGENCE *
* COMPLEX SOLUTIONS *
* CHALLENGE RESPONSE *
* CALL UP *
* THINK BACK SYSTEM WORKING*
* OBJECT *
* IMAGE*
* PATTERN *
* PATH / WAY *
* SOUND / AUDEO *
* ANIMATION / VIDEO *
* SYSTEM *
Computer Security
Prevention and Detection of unauthorized actions by users
For What..??
* Confidentiality *
* Availability *
* Non-repudiation *
* Accountability *
* Security systems *
The Platforms for which Security will provide
Mostly Web Applications & web Sites
AS
* Forums*
* Social Networking*
* Search Engines*
* Cloud Applications*
* Server Applications Systems*
* Mailing & Messaging *
Survey for MARUTI requires different
survey Material
AS
* Research Papers & Websites *
* Technical Conferences & Forums*
* International Journals *
* Project Guide*
* Personal Experience *
* Imagination & Hypothesis *
Survey for Human Identification System
AS
* Research Papers & Websites *
* Technical Conferences & Forums*
* International Journals *
* Project Guide*
* Personal Experience *
* Imagination & Hypothesis *
* Distinguishing between Humans and Robots on the Web
* Roles in information security : A survey and classification of the research area
* Safeguards and security survey and self-assessment toolkit
* Building Robust Authentication Systems With Activity-Based Personal Questions
* Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs
* Modeling Human Behavior for Defense against Flash-Crowd Attacks
* Cyber Security Using Arabic CAPTCHA Scheme
* Distinguishing Humans from Bots in Web Search Logs
* Some thoughts about writing a survey paper
SEARCH
SECURITY
HEM
BLOG
Project Guide
Dr. R. C. Thool
Personal Experience
Crawling Through Web/Papers/Books/Guide
Imagination & Hypothesis
Increase in secureness in user authentication system with high
performance & User friendly
December JanuaryNovember February
Trial & error for
Paper design
Planning For
different
Conferences
Tracking
Optimize
results
Testing
Planning for
GTC 2013
Result Merging
of all Systems
Publish / reedit
Paper
Compare
Papers & results
2nd
Presentation
MayAprilMarch June
Future
Planning
Final
Transaction
with paper
Combined
Result
FINAL
Presentation
Finalize results
with
Optimization
The Ideas Creation about user authenticating Schemes
AS
* Merging of different authentication Schemes*
* Overlapping authentication systems *
* Use of GPU to improve performance as GPGPU*
* Creation of Scheme Environment using Parallelism*
* Achieve parallelism using CUDA/OpenCL*
* Optimize use of available Hardware*
Waiting For
Suggestions …!!
Guidance …!!
Questions …!!
Queries …!!
Any else …!!

More Related Content

Similar to Hem second presentation

Web das coisas
Web das coisasWeb das coisas
Web das coisas
Centro Web
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
WSO2
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
Alexey Pyshkin
 
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud SystemsDevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
Hong-Linh Truong
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
Open Interconnect Consortium
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
OWASP Delhi
 
OGCE SciDAC2010 Tutorial
OGCE SciDAC2010 TutorialOGCE SciDAC2010 Tutorial
OGCE SciDAC2010 Tutorial
marpierc
 
Metadata - What is Unseen
Metadata - What is UnseenMetadata - What is Unseen
Metadata - What is Unseen
Edith Cowan University
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
Bob Marcus
 
Edge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AITEdge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AIT
hubraum IoT Academy
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
John Soldatos
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
Ivan Zoratti
 
Internet of Things & Co.
Internet of Things & Co.Internet of Things & Co.
Internet of Things & Co.
Damir Dobric
 
Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...
Eamonn O'Brien-Strain
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Amélie Gyrard
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application Patterns
Daniel Nüst
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Mark Underwood
 
UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16
Claire Rowland
 
Some Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information TechnologySome Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information Technology
Franz-Josef Behr
 

Similar to Hem second presentation (20)

Web das coisas
Web das coisasWeb das coisas
Web das coisas
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud SystemsDevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
OGCE SciDAC2010 Tutorial
OGCE SciDAC2010 TutorialOGCE SciDAC2010 Tutorial
OGCE SciDAC2010 Tutorial
 
Metadata - What is Unseen
Metadata - What is UnseenMetadata - What is Unseen
Metadata - What is Unseen
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Edge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AITEdge Computing and 5G, a powerful digital mix for IoT - AIT
Edge Computing and 5G, a powerful digital mix for IoT - AIT
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
 
Internet of Things & Co.
Internet of Things & Co.Internet of Things & Co.
Internet of Things & Co.
 
Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...Book Widget -- Embedding automated photo-document publication on the web and ...
Book Widget -- Embedding automated photo-document publication on the web and ...
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application Patterns
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16UX for Connected Products: EuroIA16
UX for Connected Products: EuroIA16
 
Some Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information TechnologySome Observations on Common Patterns in Information Technology
Some Observations on Common Patterns in Information Technology
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Hem second presentation

  • 1.
  • 2.
  • 3. INTRO Introduction AGENDA Explanation of status about project with sub projects as well as sub modules with their interaction & interconnections with each other for computing & managing
  • 4. PURPOSE Purpose of a Project AGENDA Provide High Security to user by using multilayer authentication system in local , Network & Cloud Systems On GPU enabled Devices
  • 5. PLATFORM Platform & Environment AGENDA Platform as computer system with HPC capability with help of GPUs Need of Smart I/O Devices , Smart Devices for Interaction
  • 6. SURVEY Survey of Research Material AGENDA Research Papers Research Websites Technical Conferences Technical Forums International Journals Project Guide Personal Experience Imagination & Hypothesis
  • 7. Timeline & Grant Chart AGENDA Project Work flow throughout 1st & 2nd semester With Process modules & planning of publishing research Papers as well as day by day project progress tracking TIMELINE
  • 8. Results & Charts AGENDA Obtained & proposed results • Security • Optimization • User Interface • Usability • Compare Past Authentication RESULTS
  • 9. Any Suggestions AGENDA Waiting For • Suggestions • Guidance • Questions • Queries Any else …!! ANY
  • 10.
  • 11. “What You Know” Knowledge “What You Have” Hard/Soft “What You Are" Biometric "What You Can " Intelligence "What You Recognize" Recognition HUMAN AUTH TECHNIQUES
  • 14. * PASSWORD * * GESTURE * * PATH * * CHALLENGE RESPONSE * * TOKENS * * PASS PHRASE * * PIN *
  • 15. * BODY PRINT * * RETINAL PATTERN * * DNA SEQUENCE * * FACE* * VOICE * * EYE * * PALM & THUMB *
  • 16. * ARTIFICIAL INTELLIGENCE ANSWERS * * MEMORY INTELIGENCE * * COMPLEX SOLUTIONS * * CHALLENGE RESPONSE * * CALL UP * * THINK BACK SYSTEM WORKING*
  • 17. * OBJECT * * IMAGE* * PATTERN * * PATH / WAY * * SOUND / AUDEO * * ANIMATION / VIDEO * * SYSTEM *
  • 18.
  • 19. Computer Security Prevention and Detection of unauthorized actions by users For What..?? * Confidentiality * * Availability * * Non-repudiation * * Accountability * * Security systems *
  • 20.
  • 21. The Platforms for which Security will provide Mostly Web Applications & web Sites AS * Forums* * Social Networking* * Search Engines* * Cloud Applications* * Server Applications Systems* * Mailing & Messaging *
  • 22.
  • 23. Survey for MARUTI requires different survey Material AS * Research Papers & Websites * * Technical Conferences & Forums* * International Journals * * Project Guide* * Personal Experience * * Imagination & Hypothesis *
  • 24. Survey for Human Identification System AS * Research Papers & Websites * * Technical Conferences & Forums* * International Journals * * Project Guide* * Personal Experience * * Imagination & Hypothesis *
  • 25. * Distinguishing between Humans and Robots on the Web * Roles in information security : A survey and classification of the research area * Safeguards and security survey and self-assessment toolkit * Building Robust Authentication Systems With Activity-Based Personal Questions * Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs * Modeling Human Behavior for Defense against Flash-Crowd Attacks * Cyber Security Using Arabic CAPTCHA Scheme * Distinguishing Humans from Bots in Web Search Logs * Some thoughts about writing a survey paper
  • 28. Project Guide Dr. R. C. Thool Personal Experience Crawling Through Web/Papers/Books/Guide Imagination & Hypothesis Increase in secureness in user authentication system with high performance & User friendly
  • 29.
  • 30. December JanuaryNovember February Trial & error for Paper design Planning For different Conferences Tracking Optimize results Testing Planning for GTC 2013 Result Merging of all Systems Publish / reedit Paper Compare Papers & results 2nd Presentation
  • 32.
  • 33. The Ideas Creation about user authenticating Schemes AS * Merging of different authentication Schemes* * Overlapping authentication systems * * Use of GPU to improve performance as GPGPU* * Creation of Scheme Environment using Parallelism* * Achieve parallelism using CUDA/OpenCL* * Optimize use of available Hardware*
  • 34.
  • 35. Waiting For Suggestions …!! Guidance …!! Questions …!! Queries …!! Any else …!!

Editor's Notes

  1. INTRODUCTIONPURPOSEPLATFORMSURVEYTIMEPLANRESULTSSUGGESTIONS
  2. “What You Know” Knowledge“What You Have” Hard/Soft piece“What You Are" Biometric"What You Can " Intelligence"What You Recall" Recognition
  3. Transition effect for timeline, slide 2(Basic)Tip: This slide is the second slide in a three-slide sequence.To reproduce the effects on this slide, do the following:In the Slides and Outline pane, right-click the previous slide (“Transition effect for timeline, slide 1”) and click Duplicate Slide.Select each of the three text boxes on the slide and change the text.Select the chevron shape on the slide. Drag the left sizing handle to the left so that the chevron shape extends past the left edge of the slide.
  4. Transition effect for timeline, slide 3(Basic)Tip: This slide is the second slide in a three-slide sequence.To reproduce the effects on this slide, do the following:In the Slides and Outline pane, right-click the previous slide (“Transition effect for timeline, slide 2”) and click Duplicate Slide.Select each of the three text boxes on the slide and change the text.Select the chevron shape on the slide. Drag the right sizing handle to the left so that the right edge of the chevron shape is 0.5” from the right edge of the slide.