Saturday, December 20, 2008

3 comments:

  1. Hello there, I have been searching the internet for a couple of days now and I find your article very interesting so I thought I'd leave you a short note to say what a terrific resource I believe you have going here, carry on the good work. Relevance of having technology skills in the field of indusstrial automation control technology

    ReplyDelete

ROBUST AND EFFICIENT PASSWORD-AUTHENTICATED KEY AGREEMENT USING SMART CARDS FOR CAMPUS MANAGEMENT

COST : 7000

Contact : 9841091117

Abstract:

An embedded system is a general purpose computer system that is the combination of software and hardware designed to do a dedicated function with minimum manual interruption. It is mostly used for automation applications, since it reduces the size and cost of product as well processing time. Embedded system is now booming technology in various fields like industrial automation, home appliances, automobiles and aeronautics etc.

User authentication and key agreement is an important security primitive for creating a securely distributed information system. Additionally, it is very useful for providing identity privacy to users. In this project we propose a robust and efficient user authentication and key agreement scheme using smart cards.

Description:

In our project” Robust and Efficient Password-Authenticated Key Agreement Using Smartcard For campus Management”, we provide the secured communication network. In various network environments, if a user wishes to use or control a remote server, the user first needs to pass the authentication scheme of the server. To provide a secure authentication system, password-based methods are often used in many remote login servers. In our project the finger print is used as a password. If the users wish to use the server, the finger print of the concerned user is passed to the local pc via microcontroller. Then the server from the remote area matches with the already stored code. If the user key is matched means the server send the smartcard to the user to access and control the server.

BLOCK DIAGRAM:

bloc diagram

bloc diagram