IT Projects

Secondary Level Authentication Using Keystroke Dynamic

Download Project Document/Synopsis There are many techniques currently used in authentication. The most common is the password. Passwords are convenient as they are easily implemented in software and require no specialized hardware. Users are also familiar with their use. Passwords also suffer from many flaws. Users frequently share passwords, forget passwords, and select poor passwords …

Secondary Level Authentication Using Keystroke Dynamic Read More »

Online Auction Using Shill Bidding Prevention

Download Project Document/Synopsis Human cheating has been a barrier to establishing trust among e-commerce users, throughout the last two decades. In particular, in online auctions, since all the transactions occur among anonymous users, trust is difficult to establish and maintain. At present, shill bidding is the most severe and persistent form of cheating in online …

Online Auction Using Shill Bidding Prevention Read More »