Gao et al., 2013 - Google Patents
A survey on the use of graphical passwords in security.Gao et al., 2013
View PDF- Document ID
- 9096427354443960788
- Author
- Gao H
- Jia W
- Ye F
- Ma L
- Publication year
- Publication venue
- J. Softw.
External Links
Snippet
Beginning around 1996, numerous graphical password schemes have been proposed, motivated by improving password usability and security, two key factors in password scheme evaluation. In this paper, we focus on the security aspects of existing graphical password …
- 238000004458 analytical method 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gao et al. | A survey on the use of graphical passwords in security. | |
Sreelatha et al. | Authentication schemes for session passwords using color and images | |
Mali et al. | Advanced pin entry method by resisting shoulder surfing attacks | |
Almuairfi et al. | IPAS: Implicit password authentication system | |
Shammee et al. | A systematic literature review of graphical password schemes | |
Khodadadi et al. | Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes. | |
Haque et al. | A new graphical password: combination of recall & recognition based approach | |
Lin et al. | Graphical passwords using images with random tracks of geometric shapes | |
Biddle et al. | Graphical passwords: Learning from the first generation | |
Ray et al. | GPOD: an efficient and secure graphical password authentication system by fast object detection | |
Arun Kumar et al. | A survey on graphical authentication system resisting shoulder surfing attack | |
Lashkari et al. | A survey on usability and security features in graphical user authentication algorithms | |
Mohamad et al. | Image based authentication using zero-knowledge protocol | |
Schwab et al. | Picture PassDoodle: usability study | |
Khodadadi et al. | Security analysis method of recognition-based graphical password | |
LIM | Multi-grid background Pass-Go | |
Farmand et al. | Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4) | |
Gao et al. | Usability and security of the recall-based graphical password schemes | |
Sreelatha et al. | Intrusion prevention by image based authentication techniques | |
Rajavat et al. | Textual and graphical password authentication scheme resistant to shoulder surfing | |
Gokhale et al. | Graphical password authentication techniques: a review | |
Binbeshr et al. | Challenge-Response Pin Authentication System to Withstand Shoulder Surfing and Recording Attacks | |
Thorawade et al. | Authentication scheme resistant to shoulder surfing attack using image retrieval | |
Narayanan | Secure Authentication using Dynamic Grid pair technique and image authentication | |
Safder | PASSWORD SECURITY, AN ANALYSIS OF AUTHENTICATION METHODS |