[go: up one dir, main page]

Gao et al., 2013 - Google Patents

A survey on the use of graphical passwords in security.

Gao et al., 2013

View PDF
Document ID
9096427354443960788
Author
Gao H
Jia W
Ye F
Ma L
Publication year
Publication venue
J. Softw.

External Links

Snippet

Beginning around 1996, numerous graphical password schemes have been proposed, motivated by improving password usability and security, two key factors in password scheme evaluation. In this paper, we focus on the security aspects of existing graphical password …
Continue reading at www.jsoftware.us (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
Gao et al. A survey on the use of graphical passwords in security.
Sreelatha et al. Authentication schemes for session passwords using color and images
Mali et al. Advanced pin entry method by resisting shoulder surfing attacks
Almuairfi et al. IPAS: Implicit password authentication system
Shammee et al. A systematic literature review of graphical password schemes
Khodadadi et al. Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes.
Haque et al. A new graphical password: combination of recall & recognition based approach
Lin et al. Graphical passwords using images with random tracks of geometric shapes
Biddle et al. Graphical passwords: Learning from the first generation
Ray et al. GPOD: an efficient and secure graphical password authentication system by fast object detection
Arun Kumar et al. A survey on graphical authentication system resisting shoulder surfing attack
Lashkari et al. A survey on usability and security features in graphical user authentication algorithms
Mohamad et al. Image based authentication using zero-knowledge protocol
Schwab et al. Picture PassDoodle: usability study
Khodadadi et al. Security analysis method of recognition-based graphical password
LIM Multi-grid background Pass-Go
Farmand et al. Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4)
Gao et al. Usability and security of the recall-based graphical password schemes
Sreelatha et al. Intrusion prevention by image based authentication techniques
Rajavat et al. Textual and graphical password authentication scheme resistant to shoulder surfing
Gokhale et al. Graphical password authentication techniques: a review
Binbeshr et al. Challenge-Response Pin Authentication System to Withstand Shoulder Surfing and Recording Attacks
Thorawade et al. Authentication scheme resistant to shoulder surfing attack using image retrieval
Narayanan Secure Authentication using Dynamic Grid pair technique and image authentication
Safder PASSWORD SECURITY, AN ANALYSIS OF AUTHENTICATION METHODS