A Shoulder Surfing Resistant Graphical Authentication System
نویسندگان
چکیده
منابع مشابه
Shoulder Surfing attack in graphical password authentication
Information and computer security is supported largely by passwords which are the principle part of the authentication process. The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solut...
متن کاملA Shoulder-Surfing Resistant Graphical Password Scheme - WIW
We propose a new graphical password scheme. It is de ned as a challenge-response identi cation. Hence, a password in our scheme is time-variant. User who knows the password is able to meet the challenge and to respond correctly. As a consequence, our graphical password scheme is shoulder-sur ng resistant. An attacker still cannot tell what the password is, even if he/she has lmed a user's login...
متن کاملNovel Shoulder-Surfing Resistant Haptic-based Graphical Password
Graphical password schemes are believed to be more secure and more resilient to dictionary attacks than textual passwords, but more vulnerable to shoulder surfing attacks. In this work, we design a new graphical password which is larger in the possible passwords’ space than in similar schemes and it is more resilient to shouldersurfing attacks. Personal entropies are integrated into the system ...
متن کاملA Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection
Although image-based user authentication systems have gotten a lot of attention recently to reduce the burden of memorizing passwords, they can be vulnerable to shouldersurfing attacks. To overcome this problem, shoulder-surfingresistant image-based authentications with indirect image selection (indirect image-based authentication, or I-IBA) have been proposed. However, because they spatially a...
متن کاملA Review on Shoulder Surfing Attack in Authentication Technique
Security is a important factor in computer system now a days. Users of computer system give a primary preference to security. Authentication is a process used to provide security to the user. Authentication is a process of identifying the person’s identity or conforming the identity of a particular person. There are various authentication method, but most commonly used method is textual passwor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2018
ISSN: 1545-5971,1941-0018,2160-9209
DOI: 10.1109/tdsc.2016.2539942