A Novel Approach on Multi Factor Authentication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Security is of paramount importance in any data critical applications or software. Traditional ways of authenticating and authorizing an individual, like username/password combinations are inherently error prone due to a variety of facts. Such as forgetting of the said combination, multiple simultaneous logins, and the actual hacking of the pair, using brute force and decryption algorithms. This paper we research on multitude of ways on enhancing the security on multiple levels and propose a new methodology which logistically provides more secure and more exclusive nature of a bond between the user and a system, this paper proposes the use of PKI for the said conception of the additional layer of security.

Keywords: Cloud, SSH, Security, PKI, RSA, SSL, Network, keygen, openSSL, Cryptography, Smart Cards

Edition: Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

Share this Article

How to Cite this Article?

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C, "A Novel Approach on Multi Factor Authentication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163633, Volume 5 Issue 5, May 2016, 1441 - 1443

53 PDF Views | 48 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'Cloud'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 7, July 2020

Pages: 1269 - 1271

Microservices: Using Distributed Tracing for Monitoring & Troubleshooting

Aditya Shrivatri

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Bird's Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Similar Articles with Keyword 'SSH'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1504 - 1509

A New Perspective of Wavelet Based Image Denoising Using Different Wavelet Thresholding

Tapan Kumar Hazra, Arpita Mazumder, Dipsikha Maity

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 1, January 2019

Pages: 986 - 994

Performance Comparison of Face Detection and Recognition Algorithms

Mohsin Furkh Dar, Dr. Sarvottam Dixit

Share this Article

Similar Articles with Keyword 'Security'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Similar Articles with Keyword 'PKI'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 5 - 9

A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment

Yogeswararao Gairaboina, Y. Siva Prasad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1449 - 1453

Review on Message Authentication Protocol for Vehicular Ad Hoc Network

Sarika A. Velukar, Dr. M. S. Ali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 597 - 601

A Novel Anonymous and Certificate Less Public Key Infrastructure for MANETs

G. Anandhi, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'RSA'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 8, August 2020

Pages: 571 - 574

Second-Generation Digital Mobile Telephone Standard using a Variation of Time Division Multiple Access (TDMA)

Manjushree T L

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1303 - 1305

Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes

N. Laxmi Manasa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1927 - 1931

Tehsil Wise Study and Analysis of Health Centers using GIS (Chittorgarh, Rajasthan, India)

Kawaljeet Singh B. L. Pal

Share this Article

Similar Articles with Keyword 'SSL'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1743 - 1745

A Survey Paper on Wireless Transport Layer Security

Parmar Paresh B., Ketan Patel

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1450 - 1456

An Aerial View of Hierarchical Energy Efficient Protocols in Wireless Body Sensor Networks

M. Devapriya, R. Sudha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Similar Articles with Keyword 'Network'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'keygen'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 405 - 409

Providing Privacy-Aware Incentives for Mobile Sensing

T. Y. Bhargavi Devi, A. L. Sreenivasulu

Share this Article

Similar Articles with Keyword 'Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1592 - 1597

Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets

Sachin P. Yadav, Amit B. Chougule

Share this Article

Similar Articles with Keyword 'Smart Cards'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1822 - 1825

Fraud Detection in Banking Sector using Data Mining

B. Rajdeepa, D. Nandhitha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 663 - 665

Secure Transaction by MIFARE Cards using NFC Technology

Tejaswini P Chinde, Deepika Dash

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 279 - 283

A Comparative Study of AES Encryption Decryption

Gurpreet Kaur, Nishi Madaan

Share this Article
Top