IJSDR
IJSDR
INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15

Issue: April 2024

Volume 9 | Issue 4

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: TWO - FACTOR AUTHENTICATION FOR STANDALONE SYSTEM USING TWO - FISH ALGORITHM
Authors Name: S.Ganesh Sumanth , A .Anil Kumar , S. Mohan Ravi Shankar , T.Deeraj , Mrs K Anuranjini
Unique Id: IJSDR2304171
Published In: Volume 8 Issue 4, April-2023
Abstract: Data protection is a demanding task in the field of information security. Data sequestration is the primary concern in information technology. At the moment two- factor authentication is extensively used in online surroundings. With this type of authentication indeed if the username and word have been compromised the authentication to lines can not take place, because there we introduced a law that's unique from train to file. Then we present a protection system by cracking and decoding the lines which offer an enhanced position of protection. This paper focuses on the perpetration of two-factor authentication styles by using both druggies-friendly traditional Alphanumeric watchwords and the private key as a gateway for authentication. An attempt has been made by using two-factor Authentication and in this paper, we describe the two-factor Authentication system design and design perpetration. therefore swinging a fresh word adds a redundant subcaste of security.
Keywords: Data is acknowledged as the most vital asset of an organization because it defines the uniqueness of every enterprise. It is the main foundation of information, knowledge, and ultimately the wisdom for correct decisions and actions. While securing the vital asset of an organization also plays an important role. Securing data from hackers is a principle of a company. We introduced a famous authentication technique in an increased secure way by using two phishing algorithm.
Cite Article: "TWO - FACTOR AUTHENTICATION FOR STANDALONE SYSTEM USING TWO - FISH ALGORITHM", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.8, Issue 4, page no.1029 - 1032, April-2023, Available :http://www.ijsdr.org/papers/IJSDR2304171.pdf
Downloads: 000337348
Publication Details: Published Paper ID: IJSDR2304171
Registration ID:205131
Published In: Volume 8 Issue 4, April-2023
DOI (Digital Object Identifier):
Page No: 1029 - 1032
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview







Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
ISSN
DOI (A digital object identifier)


Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media
IJSDR

Indexing Partner