[go: up one dir, main page]

Dias et al., 2023 - Google Patents

Deep learning based graphical password authentication approach against shoulder-surfing attacks

Dias et al., 2023

Document ID
16309693942688083991
Author
Dias N
Kumaresan M
Rajakumari R
Publication year
Publication venue
Multiagent and Grid Systems

External Links

Snippet

The password used to authenticate users is vulnerable to shoulder-surfing assaults, in which attackers directly observe users and steal their passwords without using any other technical upkeep. The graphical password system is regarded as a likely backup plan to the …
Continue reading at journals.sagepub.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Similar Documents

Publication Publication Date Title
US20230129693A1 (en) Transaction authentication and verification using text messages and a distributed ledger
Almuairfi et al. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices
Wu et al. Shoulder-surfing-proof graphical password authentication scheme
US9172692B2 (en) Systems and methods for securely transferring authentication information between a user and an electronic resource
Barr et al. Introduction: The soft power of hard states
Dias et al. Deep learning based graphical password authentication approach against shoulder-surfing attacks
Harikrishnan et al. Towards a fast and secure fingerprint authentication system based on a novel encoding scheme
Khodadadi et al. Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes.
Løge Tell me who you are and i will tell you your unlock pattern
Jahan et al. Robust user authentication model for securing electronic healthcare system using fingerprint biometrics
Ray et al. GPOD: an efficient and secure graphical password authentication system by fast object detection
Trawnih et al. Determining perceptions of banking customers regarding fingerprint ATMs
Mathew et al. A novel multifactor authentication system ensuring usability and security
Verma et al. A novel model to enhance the data security in cloud environment
Ravi Prasad et al. Multichannel EfficientNet B7 with attention mechanism using multimodal biometric-based authentication for ATM transaction
Kim et al. Spyware resistant smartphone user authentication scheme
Tiller et al. Explore-a-Nation: Combining graphical and alphanumeric authentication
Cain et al. A rapid serial visual presentation method for graphical authentication
Zimmermann¹ et al. The quest to replace passwords revisited–rating authentication schemes
Wang et al. Time evolving graphical password for securing mobile devices
Zhou et al. PassGrid: towards graph-supplemented textual shoulder surfing resistant authentication
Yesseyeva et al. Tri-Pass: A new graphical user authentication scheme
Huestegge et al. Visual search in authentication systems based on memorized faces: Effects of memory load and retention interval
Ashitha et al. Strengthening cloud security through multi-factor authentication: a comprehensive integration of diverse approaches
Chaudhry et al. Discovering trends for the development of novel authentication applications for dementia patients