
Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/8520
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ganesan, Akshaya | - |
dc.date.accessioned | 2023-01-17T10:03:28Z | - |
dc.date.available | 2023-01-17T10:03:28Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | https://ijseas.com/volume2/v2i3/ijseas20160338.pdf | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8520 | - |
dc.description.abstract | Abstract—Privacy is which data can be safely disclosed without leaking sensitive information. The objective of a knowledge based secure system is to select stronger passwords for the users and to provide them secret keys. In this paper, a multi-authority decentralized encryption scheme is proposed which provides secret keys without knowing the global identifier of the user. This scheme issues secret keys without any cooperation from the different authorities. Any authority is free to join or leave the system. Users can select passwords of higher strength using click-points. Persuasive technology is used for generating graphical passwords. Keywords-Graphical passwords,privacy,decentralized encryption,secure system | en_US |
dc.language.iso | en | en_US |
dc.publisher | IJSEAS | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Decentralized distributed systems | en_US |
dc.subject | Big Data | en_US |
dc.title | Unpredictable Password Generation using Graphical Authentication and Decentralized Encryption | en_US |
dc.type | Article | en_US |
Appears in Collections: | Department of Computer Science and Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.