Sun et al., 2016 - Google Patents
A shoulder surfing resistant graphical authentication systemSun et al., 2016
View PDF- Document ID
- 11142113395045649915
- Author
- Sun H
- Chen S
- Yeh J
- Cheng C
- Publication year
- Publication venue
- IEEE Transactions on Dependable and Secure Computing
External Links
Snippet
Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as “the weakest link” in the authentication chain. Rather …
- 241000282414 Homo sapiens 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun et al. | A shoulder surfing resistant graphical authentication system | |
Biddle et al. | Graphical passwords: Learning from the first twelve years | |
Fang et al. | THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network | |
Gao et al. | A survey on the use of graphical passwords in security. | |
Almuairfi et al. | A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices | |
Kim et al. | A new shoulder-surfing resistant password for mobile environments | |
Guerar et al. | Using screen brightness to improve security in mobile social network access | |
Azad et al. | VAP code: A secure graphical password for smart devices | |
Mali et al. | Advanced pin entry method by resisting shoulder surfing attacks | |
Nizamani et al. | A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability | |
Catuogno et al. | Analysis of a two-factor graphical password scheme | |
Alsaiari et al. | Secure graphical one time password (gotpass): an empirical study | |
Khedr | Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol | |
Biddle et al. | Graphical passwords: Learning from the first generation | |
Zangooei et al. | A hybrid recognition and recall based approach in graphical passwords | |
Tabrez et al. | Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system | |
Chiasson | Usable authentication and click-based graphical passwords | |
Awan et al. | A taxonomy of multimedia-based graphical user authentication for green Internet of Things | |
Kenneth et al. | Web application authentication using visual cryptography and cued clicked point recall-based graphical password | |
Suru et al. | Security and user interface usability of graphical authentication systems–A review | |
Panda et al. | SGP: a safe graphical password system resisting shoulder-surfing attack on smartphones | |
Alsaiari | Graphical one-time password authentication | |
Zhou et al. | PassGrid: Towards graph-supplemented textual shoulder surfing resistant authentication | |
Bostan et al. | Shoulder surfing resistant graphical password schema: Randomized Pass Points (RPP) | |
Rao et al. | Improved session based password security system |