Full Paper View Go Back

Study and Overview of Anti-Trespasser

Jayendra S Jadhav1

  1. Dept. of Computer Engineering, Lokmanya Tilak College of Engineering, Mumbai, India.

Correspondence should be addressed to: jayendra071985@gmail.com.


Section:Review Paper, Product Type: Isroset-Journal
Vol.5 , Issue.4 , pp.60-62, Aug-2017


Online published on Aug 30, 2017


Copyright © Jayendra S Jadhav . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jayendra S Jadhav, “Study and Overview of Anti-Trespasser,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.60-62, 2017.

MLA Style Citation: Jayendra S Jadhav "Study and Overview of Anti-Trespasser." International Journal of Scientific Research in Computer Science and Engineering 5.4 (2017): 60-62.

APA Style Citation: Jayendra S Jadhav, (2017). Study and Overview of Anti-Trespasser. International Journal of Scientific Research in Computer Science and Engineering, 5(4), 60-62.

BibTex Style Citation:
@article{Jadhav_2017,
author = {Jayendra S Jadhav},
title = {Study and Overview of Anti-Trespasser},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2017},
volume = {5},
Issue = {4},
month = {8},
year = {2017},
issn = {2347-2693},
pages = {60-62},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=440},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=440
TI - Study and Overview of Anti-Trespasser
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Jayendra S Jadhav
PY - 2017
DA - 2017/08/30
PB - IJCSE, Indore, INDIA
SP - 60-62
IS - 4
VL - 5
SN - 2347-2693
ER -

368 Views    184 Downloads    115 Downloads
  
  

Abstract :
In current scenario, security systems remain generic with limited authentication abilities. Existence of such security methods for primary purpose is legitimate. With the growing technology and emergence of malicious people around, it may be possible to break barriers. Safety of one’s precious data is primary concern. This project proposes a security mechanism to enhance the level of security for every individual. The application tries to leverage individual’s presence to be a key to access virtual area. The system requires mobile device with Bluetooth functionality, which is coupled with principle device that you need to secure. The Project aims to tightly couple security mechanism with the operating system allowing it to take final steps to maintain privacy of data.

Key-Words / Index Term :
Bluetooth; Piconet; Ad hoc; Trespasser;Mobile

References :
[1] Esteban Alcorn, Bluetooth Architecture Overview”, Microsoft Windows Embedded Compact 7, Published: March 2011, https://www.ieee.org/documents/ieeecitationref.pdf
[2] S.K. Kenue and J.F. Greenleaf, “Limited angle multifrequency diffiaction tomography,” IEEE Trans. Sonics Ultrason., vol. SU-29, no. 6, pp. 213-2 17, July 1982. www.techterms.com/definition/manet
[3] C. Brusaw, C. Aired, and W. Oliu, Handbook of Technical Writing, 3rd ed. New York: St. Martin’s Press, 1987. [Online]. Retrieved on- December 2016 Available: http://softsprogrammer.blogspot.com/2014/04/lock-folder
[4] G. J. Broadhead, “Style in technical and scientific writing.” In M.G. Moran and D. Joumet, eds. Research in Technical Communication. A Bibliographic Sourcebook, pp. 379-401. Westport. CT: Greenwood Press, 1985.
[5] M. M. Botvinnik, Computers in Chess: Solving Inexact Search Problems. Translated by A. Brown, Berlin: Springer-Verlap, 1984. http://www.cs.wustl.edu/~jain/cis788-97/ftp/ip_security
[6] Smart Handheld Group, Hewlett-Packard Company, Bluetooth Technology Overview[Online]. Retrieved on: October 2016 Available:(http://inpressco.com/wp-content/uploads/2015/02/Paper71397-400.pdf)
[7] Securing Computer Folders using Bluetoothand Rijndael Encryption [Online].Retrieved on - December 2016 Available: (http://inpressco.com/wp-content/uploads/2015/02/Paper71397-400.pdf)
[8] Securing ComputerDeviceUsing Bluetoothtechnology, Retrieved on- December 2016, [Online]. Available: (http://www.ijecs.in/issue/v4-i4/60%20ijecs.pdf)
[9] Wankhade S.B., Damani A.G., Desai S.J., Khanapure A .V., “An Innovative Approach to File Security using Bluetooth”, Mumbai, Maharashtra, IJSET, Vol. 02, Issue No. 5, pp:417-223

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation