Effective Authentication for Restricing Unauthorized User | IEEE Conference Publication | IEEE Xplore