pith. sign in

arxiv: 1305.1428 · v1 · pith:QJYQMWFNnew · submitted 2013-05-07 · 💻 cs.CY

Speech based Password Protected Cyber Applications

classification 💻 cs.CY
keywords passwordapplicationsprotectedcomputercybere-shoppingspeechthink
0
0 comments X p. Extension
pith:QJYQMWFN Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{QJYQMWFN}

Prints a linked pith:QJYQMWFN badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Whenever we think of cyber applications, we visualize the model that gives the idea that we are sitting in front of computer at home or workplace connected to internet and performing all the work that generally we have to go and do on a specific place for example e-shopping, e-banking, e-education etc. In case of e-shopping, we view all the products on the computer screen with all details by a single mouse click, select the product and do all further money transaction through net. When we think of security, is it 100% secure? No, not at all because though it is password protected, the password is a text base secrete code that can be open. Therefore this paper is concentrated on preparation of speech based password protected applications.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.