Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Sun et al., 2016 - Google Patents

A shoulder surfing resistant graphical authentication system

Sun et al., 2016

View PDF
Document ID
11142113395045649915
Author
Sun H
Chen S
Yeh J
Cheng C
Publication year
Publication venue
IEEE Transactions on Dependable and Secure Computing

External Links

Snippet

Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as “the weakest link” in the authentication chain. Rather …
Continue reading at scholarworks.boisestate.edu (PDF) (other versions)
  • 241000282414 Homo sapiens 0 abstract description 4

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Similar Documents

Publication Publication Date Title
Sun et al. A shoulder surfing resistant graphical authentication system
Biddle et al. Graphical passwords: Learning from the first twelve years
Fang et al. THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network
Gao et al. A survey on the use of graphical passwords in security.
Almuairfi et al. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices
Kim et al. A new shoulder-surfing resistant password for mobile environments
Guerar et al. Using screen brightness to improve security in mobile social network access
Azad et al. VAP code: A secure graphical password for smart devices
Mali et al. Advanced pin entry method by resisting shoulder surfing attacks
Nizamani et al. A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability
Catuogno et al. Analysis of a two-factor graphical password scheme
Alsaiari et al. Secure graphical one time password (gotpass): an empirical study
Khedr Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol
Biddle et al. Graphical passwords: Learning from the first generation
Zangooei et al. A hybrid recognition and recall based approach in graphical passwords
Tabrez et al. Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system
Chiasson Usable authentication and click-based graphical passwords
Awan et al. A taxonomy of multimedia-based graphical user authentication for green Internet of Things
Kenneth et al. Web application authentication using visual cryptography and cued clicked point recall-based graphical password
Suru et al. Security and user interface usability of graphical authentication systems–A review
Panda et al. SGP: a safe graphical password system resisting shoulder-surfing attack on smartphones
Alsaiari Graphical one-time password authentication
Zhou et al. PassGrid: Towards graph-supplemented textual shoulder surfing resistant authentication
Bostan et al. Shoulder surfing resistant graphical password schema: Randomized Pass Points (RPP)
Rao et al. Improved session based password security system