[go: up one dir, main page]

Haque et al., 2014 - Google Patents

A new graphical password: combination of recall & recognition based approach

Haque et al., 2014

View PDF
Document ID
11988193307357988054
Author
Haque M
Imam B
Publication year
Publication venue
International Journal of Computer, Electrical, Automation, Control and Information Engineering

External Links

Snippet

Information Security is the most describing problem in present times. To cop up with the security of the information, the passwords were introduced. The alphanumeric passwords are the most popular authentication method and still used up to now. However, text based …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Sreelatha et al. Authentication schemes for session passwords using color and images
Gao et al. A survey on the use of graphical passwords in security.
Khan et al. A graphical password based system for small mobile devices
Zhu et al. Captcha as graphical passwords—A new security primitive based on hard AI problems
Wu et al. Shoulder-surfing-proof graphical password authentication scheme
Almuairfi et al. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices
Haque et al. A new graphical password: combination of recall & recognition based approach
Rao et al. Novel shoulder-surfing resistant authentication schemes using text-graphical passwords
Ray Ray’s scheme: graphical password based hybrid authentication system for smart hand held devices
Almuairfi et al. IPAS: Implicit password authentication system
Shammee et al. A systematic literature review of graphical password schemes
Jadhao et al. Survey on authentication password techniques
Lai et al. A shoulder-surfing resistant scheme embedded in traditional passwords
Hu et al. The security analysis of graphical passwords
Ray et al. GPOD: an efficient and secure graphical password authentication system by fast object detection
Tabrez et al. Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system
Sunil et al. Cued click points: Graphical password authentication technique for security
Por et al. The design and implementation of background Pass-Go scheme towards security threats
Yesseyeva et al. Tri-Pass: A new graphical user authentication scheme
Mohamad et al. Image based authentication using zero-knowledge protocol
Sreelatha et al. Intrusion prevention by image based authentication techniques
Rajavat et al. Textual and graphical password authentication scheme resistant to shoulder surfing
Dabeer et al. A novel hybrid user authentication scheme using cognitive ambiguous illusion images
Kumar et al. PassPattern System (PPS): a pattern-based user authentication scheme
Sugumar et al. Cursor masquerade: Masking of authentic cursor using random numeric keypad and spurious cursors