[go: up one dir, main page]

Suru et al., 2019 - Google Patents

Security and user interface usability of graphical authentication systems–A review

Suru et al., 2019

View PDF
Document ID
3434447956203116329
Author
Suru H
Murano P
Publication year
Publication venue
International Journal of Engineering Trends and Technology (IJERT)

External Links

Snippet

Alphanumeric text and PINs continue to be the dominant authentication methods in spite of the numerous concerns by security researchers of their inability to properly address usability and security flaws and to effectively combine usability and security. These flaws have …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Similar Documents

Publication Publication Date Title
Biddle et al. Graphical passwords: Learning from the first twelve years
Sun et al. A shoulder surfing resistant graphical authentication system
Sreelatha et al. Authentication schemes for session passwords using color and images
Gao et al. A survey on the use of graphical passwords in security.
Garfinkel et al. Usable security: History, themes, and challenges
ES2279933T3 (en) AUTHENTICATION SYSTEM AND PROCEDURE BASED ON THE RECOGNITION OF RANDOM PARTIAL MODELS.
Suru et al. Security and user interface usability of graphical authentication systems–A review
Nizamani et al. A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability
Biddle et al. Graphical passwords: Learning from the first generation
English et al. Towards a metric for recognition-based graphical password security
Zangooei et al. A hybrid recognition and recall based approach in graphical passwords
Awan et al. A taxonomy of multimedia-based graphical user authentication for green Internet of Things
Binbeshr et al. Secure pin-entry method using one-time pin (OTP)
Alsaiari Graphical one-time password authentication
Schwab et al. Picture PassDoodle: usability study
Sreelatha et al. Intrusion prevention by image based authentication techniques
Shiaeles Grablok: A novel graphical password authentication utilising blockchain technology
Safder PASSWORD SECURITY, AN ANALYSIS OF AUTHENTICATION METHODS
Chopra et al. A bankable pictorial password authentication approach
Pais et al. Illusion PIN: tricking the eye to defeat shoulder surfing attack by using hybrid images
Simha et al. Pass Matrix checks for Login Authentication
Rao et al. Improved session based password security system
Suru Security and usability in a hybrid property based graphical authentication system
Jonsson et al. Multi-factor authentication mechanism based on browser fingerprinting and graphical honeytokens
Gong et al. A Dynamic and Incremental Graphical Grid Authentication Technique for Mobile and Web Applications