[go: up one dir, main page]

Abbas et al., 2023 - Google Patents

Pass point selection of automatic graphical password authentication technique based on histogram method

Abbas et al., 2023

View PDF
Document ID
12496546838575015202
Author
Abbas S
Jawad L
Publication year
Publication venue
Iraqi Journal of Information and Communication Technology

External Links

Snippet

Graphical passwords, as opposed to textual passwords, require the user to pick pictures or draw symbols rather than input written letters. They are an option that may be explored in order to get over the issues that are caused by the system of passwords that are based on …
Continue reading at mail.ijict.edu.iq (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Similar Documents

Publication Publication Date Title
US11468157B2 (en) Method for authenticating a user by user identifier and associated graphical password
US8918849B2 (en) Secure user credential control
Sreelatha et al. Authentication schemes for session passwords using color and images
Gao et al. Design and analysis of a graphical password scheme
US20150067786A1 (en) Visual image authentication and transaction authorization using non-determinism
US11693944B2 (en) Visual image authentication
Ogiela et al. Application of knowledge‐based cognitive CAPTCHA in Cloud of Things security
Zangooei et al. A hybrid recognition and recall based approach in graphical passwords
Abbas et al. Pass point selection of automatic graphical password authentication technique based on histogram method
Ray et al. GPOD: an efficient and secure graphical password authentication system by fast object detection
Yadav et al. Adding Persuasive features in Graphical Password to increase the capacity of KBAM
Ghiyamipour Secure graphical password based on cued click points using fuzzy logic
Joshi et al. Authentication using text and graphical password
Abraheem et al. Survey of various graphical password techniques and their schemes
Alfard et al. IoTGazePass: A new password scheme for IoT applications
Lashkari et al. A survey on usability and security features in graphical user authentication algorithms
Wang et al. Time evolving graphical password for securing mobile devices
Mohamad et al. Image based authentication using zero-knowledge protocol
LIM Multi-grid background Pass-Go
Hanif et al. A new shoulder surfing and mobile key-logging resistant graphical password scheme for smart-held devices
Potey et al. Secure authentication for data protection in cloud computing using color schemes
Boonkrong Password-based authentication
Al-Shqeerat Securing a question-based multi-factor authentication system using LSB steganography technique
Khedkar et al. A Comprehensive Survey of Graphical Passwords Authentication Systems that Provides Security
Zarif et al. A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs.