期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs
1
作者 Sameh Zarif Hadier Moawad +4 位作者 Khalid Amin Abdullah Alharbi Wail SElkilani Shouze Tang Marian Wagdy 《Computer Systems Science & Engineering》 2025年第1期79-98,共20页
Authentication is the most crucial aspect of security and a predominant measure employed in cybersecurity.Cloud computing provides a shared electronic device resource for users via the internet,and the authentication ... Authentication is the most crucial aspect of security and a predominant measure employed in cybersecurity.Cloud computing provides a shared electronic device resource for users via the internet,and the authentication techniques used must protect data from attacks.Previous approaches failed to resolve the challenge of making passwords secure,memorable,usable,and time-saving.Graphical Password(GP)is still not widely utilized in reality because consumers suffer from multiple login stages.This paper proposes an Indexed Choice-Based Graphical Password(ICGP)scheme for improving the authentication part.ICGP consists of two stages:registration and authentication.At the registration stage,the user registers his/her data user name a number called Index Number(IN),and chooses an image from a grid of images.After completing the registration,ICGP gives the user a random unique number(UNo)to be a user ID.At the authentication stage,the user chooses a different image from the grid based on the random appearance of the registered image dimensions on the grid plus the registered Index Number.ICGP password is a combination of three factors;user’s name,UNo,and any image.According to the experiments,the proposed ICGP has achieved great improvements when compared to prior methods.The ICGP has increased the possible password numbers from 9.77e+6 to 3.74e+30,the password space from 1.20e+34 to 1.37e+84,and decreased the password entropy from 7.16e−7 to 8.26e−30. 展开更多
关键词 AUTHENTICATION graphical password indexed choice-based graphical password user image system user number index number password space password entropy
在线阅读 下载PDF
Web Application Authentication Using Visual Cryptography and Cued Clicked Point Recall-based Graphical Password
2
作者 Mary Ogbuka Kenneth Stephen Michael Olujuwon 《Journal of Computer Science Research》 2021年第3期29-41,共13页
Alphanumerical usernames and passwords are the most used computer authentication technique.This approach has been found to have a number of disadvantages.Users,for example,frequently choose passwords that are simple t... Alphanumerical usernames and passwords are the most used computer authentication technique.This approach has been found to have a number of disadvantages.Users,for example,frequently choose passwords that are simple to guess.On the other side,if a password is difficult to guess,it is also difficult to remember.Graphical passwords have been proposed in the literature as a potential alternative to alphanumerical passwords,based on the fact that people remember pictures better than text.Existing graphical passwords,on the other hand,are vulnerable to a shoulder surfing assault.To address this shoulder surfing vulnerability,this study proposes an authentication system for web-applications based on visual cryptography and cued click point recall-based graphical password.The efficiency of the proposed system was validated using unit,system and usability testing measures.The results of the system and unit testing showed that the proposed system accomplished its objectives and requirements.The results of the usability test showed that the proposed system is easy to use,friendly and highly secured. 展开更多
关键词 password authentication graphical password Text password Visual cryptography Shoulder surfing Key-logging
在线阅读 下载PDF
Graphical password: prevent shoulder-surfing attack using digraph substitution rules 被引量:3
3
作者 Lip Yee POR Chin Soon KU +1 位作者 Amanul ISLAM Tan Fong ANG 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第6期1098-1108,共11页
In this paper, a new scheme that uses digraph substitution rules to conceal the mechanism or activity re- quired to derive password-images is proposed. In the pro- posed method, a user is only required to click on one... In this paper, a new scheme that uses digraph substitution rules to conceal the mechanism or activity re- quired to derive password-images is proposed. In the pro- posed method, a user is only required to click on one of the pass-image instead of both pass-images shown in each chal- lenge set for three consecutive sets. While this activity is sim- ple enough to reduce login time, the images clicked appear to be random and can only be obtained with complete knowl- edge of the registered password along with the activity rules. Thus, it becomes impossible for shoulder-surfing attackers to obtain the information about which password images and pass-images are used by the user. Although the attackers may know about the digraph substitution rules used in the pro- posed method, the scenario information used in each chal- lenge set remains. User study results reveal an average login process of less than half a minute. In addition, the proposed method is resistant to shoulder-surfing attacks. 展开更多
关键词 graphical password AUTHENTICATION shoulder-surfing data and computer security digraph substitution rules
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部