Dias et al., 2023 - Google Patents
Deep learning based graphical password authentication approach against shoulder-surfing attacksDias et al., 2023
- Document ID
- 16309693942688083991
- Author
- Dias N
- Kumaresan M
- Rajakumari R
- Publication year
- Publication venue
- Multiagent and Grid Systems
External Links
Snippet
The password used to authenticate users is vulnerable to shoulder-surfing assaults, in which attackers directly observe users and steal their passwords without using any other technical upkeep. The graphical password system is regarded as a likely backup plan to the …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20230129693A1 (en) | Transaction authentication and verification using text messages and a distributed ledger | |
| Almuairfi et al. | A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices | |
| Wu et al. | Shoulder-surfing-proof graphical password authentication scheme | |
| US9172692B2 (en) | Systems and methods for securely transferring authentication information between a user and an electronic resource | |
| Barr et al. | Introduction: The soft power of hard states | |
| Dias et al. | Deep learning based graphical password authentication approach against shoulder-surfing attacks | |
| Harikrishnan et al. | Towards a fast and secure fingerprint authentication system based on a novel encoding scheme | |
| Khodadadi et al. | Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes. | |
| Løge | Tell me who you are and i will tell you your unlock pattern | |
| Jahan et al. | Robust user authentication model for securing electronic healthcare system using fingerprint biometrics | |
| Ray et al. | GPOD: an efficient and secure graphical password authentication system by fast object detection | |
| Trawnih et al. | Determining perceptions of banking customers regarding fingerprint ATMs | |
| Mathew et al. | A novel multifactor authentication system ensuring usability and security | |
| Verma et al. | A novel model to enhance the data security in cloud environment | |
| Ravi Prasad et al. | Multichannel EfficientNet B7 with attention mechanism using multimodal biometric-based authentication for ATM transaction | |
| Kim et al. | Spyware resistant smartphone user authentication scheme | |
| Tiller et al. | Explore-a-Nation: Combining graphical and alphanumeric authentication | |
| Cain et al. | A rapid serial visual presentation method for graphical authentication | |
| Zimmermann¹ et al. | The quest to replace passwords revisited–rating authentication schemes | |
| Wang et al. | Time evolving graphical password for securing mobile devices | |
| Zhou et al. | PassGrid: towards graph-supplemented textual shoulder surfing resistant authentication | |
| Yesseyeva et al. | Tri-Pass: A new graphical user authentication scheme | |
| Huestegge et al. | Visual search in authentication systems based on memorized faces: Effects of memory load and retention interval | |
| Ashitha et al. | Strengthening cloud security through multi-factor authentication: a comprehensive integration of diverse approaches | |
| Chaudhry et al. | Discovering trends for the development of novel authentication applications for dementia patients |