A Shoulder Surfing Resistant Graphical Authentication System

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Shoulder Surfing attack in graphical password authentication

Information and computer security is supported largely by passwords which are the principle part of the authentication process. The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solut...

متن کامل

A Shoulder-Surfing Resistant Graphical Password Scheme - WIW

We propose a new graphical password scheme. It is de ned as a challenge-response identi cation. Hence, a password in our scheme is time-variant. User who knows the password is able to meet the challenge and to respond correctly. As a consequence, our graphical password scheme is shoulder-sur ng resistant. An attacker still cannot tell what the password is, even if he/she has lmed a user's login...

متن کامل

Novel Shoulder-Surfing Resistant Haptic-based Graphical Password

Graphical password schemes are believed to be more secure and more resilient to dictionary attacks than textual passwords, but more vulnerable to shoulder surfing attacks. In this work, we design a new graphical password which is larger in the possible passwords’ space than in similar schemes and it is more resilient to shouldersurfing attacks. Personal entropies are integrated into the system ...

متن کامل

A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection

Although image-based user authentication systems have gotten a lot of attention recently to reduce the burden of memorizing passwords, they can be vulnerable to shouldersurfing attacks. To overcome this problem, shoulder-surfingresistant image-based authentications with indirect image selection (indirect image-based authentication, or I-IBA) have been proposed. However, because they spatially a...

متن کامل

A Review on Shoulder Surfing Attack in Authentication Technique

Security is a important factor in computer system now a days. Users of computer system give a primary preference to security. Authentication is a process used to provide security to the user. Authentication is a process of identifying the person’s identity or conforming the identity of a particular person. There are various authentication method, but most commonly used method is textual passwor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2018

ISSN: 1545-5971,1941-0018,2160-9209

DOI: 10.1109/tdsc.2016.2539942