Review of “ Graphical authentication – an alternative to textual based authentication ” by

نویسندگان

  • Payel Bandyopadhyay
  • Tomi Reiman
  • P. Bandyopadhyay
چکیده

 “In this paper, I will be concentrating..” o To me this seems a bit too formal, I would suggest replacing “I” with just “This paper will concentrate/focus on..” o Same with “At the end, I will also be presenting”  “Graphical authentication contain images as a replacement to alphanumeric and special characters, which are easier to remember” o contain  contains o It is unclear as to where the “which are easier to remember” refers to, as it is written after the noun “characters”. I would imagine that the idea here is to give the impression that images are easier to remember?  “So researchers have come up with..” o Sounds a bit too informal.  text based  text-based

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review on Color Password to Resist Shoulder Surfing Attack

Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password schemes have been proposed. Unfortunately, both the text-based password schemes and graphical password schemes are not se...

متن کامل

A Vision Based Graphical Password

Graphical password is an authentication means alternative to textual password and biometric password. Graphical passwords are classified into two groups: picture based password and userdrawn based password. To pass the authentication, in the picture based graphical password, users have to choose right photos whereas in the user-drawn based graphical password, users have to draw correct pictures...

متن کامل

Graphical authentication – an alternative to textual based authentication

Text based password consists of alphanumeric and special characters, which we often use while maintaining user accounts. But these text based passwords are often very difficult to remember and are vulnerable to various types of attacks. So researchers have come up with various alternatives to text based passwords, out of which graphical authentication is one of them. In this paper, I will be co...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

A Research on Authentication Scheme for Session Passwords with Colour Pairs and Grid Compared with OTP

To provide the security mainly authentication and authorisation is given to the system. For that purpose mostly textual passwords are being used. Now a day’s graphical password are also available. The password schemes those are being used by now Days are mostly textual password and the graphical password (pattern matching), textual passwords are vulnerable to eves dropping, dictionary attacks, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013