Skip to main content

Showing 1–7 of 7 results for author: Avadhani, P S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1112.2265  [pdf

    cs.CR cs.NE

    A Novel Approach for Password Authentication Using Bidirectional Associative Memory

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, Prof. P. S. Avadhani

    Abstract: Password authentication is a very important system security procedure to gain access to user resources. In the Traditional password authentication methods a server has check the authenticity of the users. In our proposed method users can freely select their passwords from a predefined character set. They can also use a graphical image as password. The password may be a character or an image it wil… ▽ More

    Submitted 10 December, 2011; originally announced December 2011.

    Comments: 13 pages

    Journal ref: Advanced Computing: An International Journal ( ACIJ ), Vol.2, No.6, November 2011

  2. arXiv:1110.1502  [pdf

    cs.CR

    Hilbert Matrix Based Cryptosystem using a Session Key

    Authors: Penmetsa V. Krishna Raja, A. S. N. Chakravarthy, P. S. Avadhani

    Abstract: Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit. Classical cryptanalysis involves an interesting combination of analyt… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: five pages

    Journal ref: International Journal of Engineering Research and Applications (IJERA) Vol. 1, Issue 3, 2011, pp.711-715

  3. arXiv:1110.1498  [pdf

    cs.CR cs.NI

    A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode

    Authors: Penmetsa V. Krishna Raja, A. S. N. Chakravarthy, P. S. Avadhani

    Abstract: Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involv… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: six pages; International Journal of Mathematics Trends and Technology- July to Aug Issue 2011

  4. arXiv:1110.1495  [pdf

    cs.CR cs.NE

    A Probabilistic Approach for Authenticating Text or Graphical Passwords Using Back Propagation

    Authors: ASN Chakravarthy, Prof. P S Avadhani

    Abstract: Password authentication is a common approach to the system security and it is also a very important procedure to gain access to user resources. In the conventional password authentication methods a server has to authenticate the legitimate user. In our proposed method users can freely choose their passwords from a defined character set or they can use a graphical image as password and that input w… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: ten pages

    Journal ref: International Journal of Computer Science and Network Security, VOL.11 No.5, May 2011

  5. arXiv:1110.1490  [pdf

    cs.CR cs.NE

    A Novel Approach for Pass Word Authentication using Brain -State -In -A Box (BSB) Model

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, P. S Avadhani

    Abstract: Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle a… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: five pages

    Journal ref: International Journal of Computer Science and Information Technologies (IJCSIT), Volume 2 Issue 5 2011,2127-2131

  6. arXiv:1110.1488  [pdf

    cs.CR

    Handwritten Text Image Authentication using Back Propagation

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, P. S. Avadhani

    Abstract: Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle a… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: 10 pages pdf file

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011

  7. arXiv:1108.1434  [pdf

    cs.CR cs.NE

    A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network

    Authors: ASN Chakravarthy, P S Avadhani, P. E. S. N Krishna Prasad, N. Rajeevand, D. Rajasekhar Reddy

    Abstract: Password authentication using Hopfield Networks is presented in this paper. In this paper we discussed the Hopfield Network Scheme for Textual and graphical passwords, for which input Password will be converted in to probabilistic values. We observed how to get password authentication using Probabilistic values for Textual passwords and Graphical passwords. This study proposes the use of a Hopfiel… ▽ More

    Submitted 5 August, 2011; originally announced August 2011.

    Comments: 14 pages, 18 figures, published in Advanced Computing: An International Journal (ACIJ)

    Journal ref: Advanced Computing: An International Journal ( ACIJ ), Vol.2, No.4, July 2011