A Vein Map Technology in Combination with Kerberos Authentication Protocol
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 88 | Views: 289

Survey Paper | Software Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.3 / 10


     

A Vein Map Technology in Combination with Kerberos Authentication Protocol

Asmita B. Kalamkar, Dr. K. N. Honwadkar


Abstract: In the twenty first era the protection of data or information has become a very critical subject. There is increasing demand from every private as well as government agencies for the stronger authentication system that will be difficult to breach. So the idea of biometric authentication came into picture. There are various types of biometric authentication that are used over the times, such as finger print recognition, facial recognition, retina scanning and iris scanning. These biometrics all found with the different flaws. So the vein map technology came into existence. The vein map technology uses sensors that are only able to recognize vein patterns, if hemoglobin is actively flowing through the person's veins. More over each person's vein map is unique, no two person in the world can have the same vein map. For additional security purpose we can combine vein map technology with the Kerberos authentication protocol. The use of such a unique biometrics in combination with encryption of that biometric along with different registration server and authentication server the system will be very difficult to breach.


Keywords: Vein map technology, Authentication Protocol, Biometric, Kerberos, Token Granting


Edition: Volume 3 Issue 11, November 2014


Pages: 2002 - 2004



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Asmita B. Kalamkar, Dr. K. N. Honwadkar, "A Vein Map Technology in Combination with Kerberos Authentication Protocol", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2002-2004, https://www.ijsr.net/getabstract.php?paperid=OCT141447, DOI: https://www.doi.org/10.21275/OCT141447

Similar Articles

Downloads: 104

Research Paper, Software Engineering, Nigeria, Volume 5 Issue 2, February 2016

Pages: 1278 - 1286

Development of a Two-Level Segmentation System for Iris Recognition Using Circular and Linear Hough Transform Algorithm

Olusegun Olayinka Lawal, Babajide Olakunle Afeni, Moshood Olatunji Lawal

Share this Article

Downloads: 121

Review Papers, Software Engineering, India, Volume 5 Issue 11, November 2016

Pages: 549 - 550

Review on the Security Perspectives of Service Oriented Architecture (SOA)

Krishnadas Ravindran

Share this Article

Downloads: 154

Research Paper, Software Engineering, Mexico, Volume 7 Issue 12, December 2018

Pages: 1214 - 1217

Study of the Precision and Feasibility of Facial Recognition using OpenCV with Java for a System of Assistance Control

Rene Cuamatzi Briones, Juan Ramos Ramos, Rodrigo Tlapa Gonzalez, Jose Juan Hernandez Mora

Share this Article
Top