Multi-level Scalable Textual-Graphical Password Authentication Scheme for Web based Applications
نویسندگان
چکیده
منابع مشابه
Graphical Authentication Using Region Based Graphical Password
Password authentication is failing as an authentication since it increases the user burden to remember the passwords. Graphical authentication is proposed as a alternative for textual passwords since it may be easy for users to remember.In this paper we propose a new image region selection based graphical password scheme. We are going to present a new technique for authentication which is based...
متن کاملGraphical Password Using Captcha for More Secure Authentication Scheme
388 ISSN: 2278 – 1323 All Rights Reserved © 2015 IJARCET Abstract: A new security primitive for new graphical authentication scheme based on hard artificial intelligence problems. Number of graphical password scheme has been proposed as options to traditional to text password authentication, namely a new family of graphical password system for Captcha technology with the level of security. We...
متن کاملA tabular steganography scheme for graphical password authentication
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregul...
متن کاملA Multi-Grid Graphical Password Scheme
The vast majority of computer and communication systems use passwords in order to identify users. Unfortunately, in ubiquitous alpha-numeric password schemes, users tend to choose passwords with predictable characteristics, related to how easy they are to remember. To overcome the vulnerabilities of textual passwords, a lot of alternative techniques have been proposed such as visual or graphica...
متن کاملA Robust Password-Based Multi-Server Authentication Scheme
In 2013, Tsai et al. cryptanalyzed Yeh et al. scheme and shown that Yeh et al., scheme is vulnerable to various cryptographic attacks and proposed an improved scheme. In this poster we will show that Tsai et al., scheme is also vulnerable to undetectable online password guessing attack, on success of the attack, the adversary can perform all major cryptographic attacks. As apart of our contribu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: REV Journal on Electronics and Communications
سال: 2014
ISSN: 1859-378X,1859-378X
DOI: 10.21553/rev-jec.64