[go: up one dir, main page]

Alfard et al., 2021 - Google Patents

IoTGazePass: A new password scheme for IoT applications

Alfard et al., 2021

Document ID
3759826393677472641
Author
Alfard F
Keshlaf A
Bouzid O
Publication year
Publication venue
2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA

External Links

Snippet

Authentication is one of the most important security aspects to protect user privacy in computers, internet environments and IoT applications. In this regard, the traditional textual- based password type is the most common means of authentication. However, this type of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0853Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Zhu et al. Captcha as graphical passwords—A new security primitive based on hard AI problems
Mali et al. Advanced pin entry method by resisting shoulder surfing attacks
US8918849B2 (en) Secure user credential control
Almuairfi et al. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices
Rao et al. Novel shoulder-surfing resistant authentication schemes using text-graphical passwords
US20130139238A1 (en) Method and System For Authenticating User Access To A Restricted Resource Across A Computer Network
Almuairfi et al. IPAS: Implicit password authentication system
KR20220123657A (en) Privacy biometric authentication
Haque et al. A new graphical password: combination of recall & recognition based approach
Ray et al. GPOD: an efficient and secure graphical password authentication system by fast object detection
Islam et al. A review on recognition-based graphical password techniques
Alfard et al. IoTGazePass: A new password scheme for IoT applications
Awan et al. A taxonomy of multimedia-based graphical user authentication for green Internet of Things
KR100927280B1 (en) How to prevent secure string exposure using fake rounds
Arun Kumar et al. A survey on graphical authentication system resisting shoulder surfing attack
Mihajlov et al. ImagePass-Designing graphical authentication for security
Djeki et al. Reimagining Authentication: A User-Centric Two-Factor Authentication with Personalized Image Verification
Yesseyeva et al. Tri-Pass: A new graphical user authentication scheme
Zhou et al. PassGrid: towards graph-supplemented textual shoulder surfing resistant authentication
Maheshwari et al. SPOSS: secure pin-based-authentication obviating shoulder surfing
van Oorschot User authentication—passwords, biometrics and alternatives
Mihajlov et al. Recognition-based graphical authentication with single-object images
LIM Multi-grid background Pass-Go
Kumar et al. PassPattern System (PPS): a pattern-based user authentication scheme
Rajavat et al. Textual and graphical password authentication scheme resistant to shoulder surfing