ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 09 May 2017 My Price 8.00

The authentication scheme

Design an authentication scheme that “learns.” The authentication scheme will start with certain primitive information about a user, such as name and password. As the use of the computing system continues, the authentication system will gather such information as commonly used programming languages; dates, times, and lengths of computing sessions; and use of distinctive resources. The authentication challenges should become more individualized as the system learns more information about the user.


    • Your  design should include a list of many pieces of information about a user  that the system could collect. It is permissible for the system to ask  an authenticated user for certain additional information, such as a  favorite book, to use in subsequent challenges.
    • Your  design should also consider the problem of presenting and validating  these challenges: Does the would-be user answer a true-false or a  multiple-choice question?  Does the system interpret natural language  prose? 
  • I have most of this done just need help filling the last half page and proofreading correcting the errors 

Answers

(11)
Status NEW Posted 09 May 2017 02:05 AM My Price 8.00

-----------

Not Rated(0)