Suru et al., 2019 - Google Patents
Security and user interface usability of graphical authentication systems–A reviewSuru et al., 2019
View PDF- Document ID
- 3434447956203116329
- Author
- Suru H
- Murano P
- Publication year
- Publication venue
- International Journal of Engineering Trends and Technology (IJERT)
External Links
Snippet
Alphanumeric text and PINs continue to be the dominant authentication methods in spite of the numerous concerns by security researchers of their inability to properly address usability and security flaws and to effectively combine usability and security. These flaws have …
- 238000011160 research 0 abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Biddle et al. | Graphical passwords: Learning from the first twelve years | |
Sun et al. | A shoulder surfing resistant graphical authentication system | |
Sreelatha et al. | Authentication schemes for session passwords using color and images | |
Gao et al. | A survey on the use of graphical passwords in security. | |
Garfinkel et al. | Usable security: History, themes, and challenges | |
ES2279933T3 (en) | AUTHENTICATION SYSTEM AND PROCEDURE BASED ON THE RECOGNITION OF RANDOM PARTIAL MODELS. | |
Suru et al. | Security and user interface usability of graphical authentication systems–A review | |
Nizamani et al. | A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability | |
Biddle et al. | Graphical passwords: Learning from the first generation | |
English et al. | Towards a metric for recognition-based graphical password security | |
Zangooei et al. | A hybrid recognition and recall based approach in graphical passwords | |
Awan et al. | A taxonomy of multimedia-based graphical user authentication for green Internet of Things | |
Binbeshr et al. | Secure pin-entry method using one-time pin (OTP) | |
Alsaiari | Graphical one-time password authentication | |
Schwab et al. | Picture PassDoodle: usability study | |
Sreelatha et al. | Intrusion prevention by image based authentication techniques | |
Shiaeles | Grablok: A novel graphical password authentication utilising blockchain technology | |
Safder | PASSWORD SECURITY, AN ANALYSIS OF AUTHENTICATION METHODS | |
Chopra et al. | A bankable pictorial password authentication approach | |
Pais et al. | Illusion PIN: tricking the eye to defeat shoulder surfing attack by using hybrid images | |
Simha et al. | Pass Matrix checks for Login Authentication | |
Rao et al. | Improved session based password security system | |
Suru | Security and usability in a hybrid property based graphical authentication system | |
Jonsson et al. | Multi-factor authentication mechanism based on browser fingerprinting and graphical honeytokens | |
Gong et al. | A Dynamic and Incremental Graphical Grid Authentication Technique for Mobile and Web Applications |