Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
One of the most important topics in information security today is user authentication. There is a good security when using the text-based strong password schemes but often memorizing the password is so difficult and users writing them... more
    • by 
    •   6  
      WatermarkingGraphical PasswordGraphical User InterfacesShoulder surfing
In today's world, securing the assets is necessary that can be done by password. But imagine if password is stolen or hacked then what about the security of assets? In this Paper, we have discussed the major attacks as well as password... more
    • by 
    •   27  
      Shoulder Surfing ProblemMobile PhishingShoulder surfingShoulder Surfing Resistant Graphical Password Schemes
We present captcha as graphical passwords inmany security primitives square measure supported laborious mathematical issues. Exploitation laborious AI issues for security is rising as AN exciting new paradigm, however has been beneath... more
    • by 
    •   13  
      AIOnline SecurityShoulder surfingAttack
    • by 
    •   6  
      Eye trackingTouch ScreenBit Error RateUser Study
    • by 
    •   8  
      Computer ScienceHuman Computer InteractionInformation TechnologyInformation Security
    • by 
    •   2  
      Computer VisionShoulder surfing
Password authentication is one of the most important components for security and confidentiality of data that is stored on various workstations and servers. There are various kinds of ways to authenticate passwords, for example, textual... more
    • by 
    •   6  
      Information TechnologyInformation SecurityComputer SecurityAuthentication
Information and computer security is supported largely by passwords which are the principle part of the authentication process. Traditionally, picturebased password systems employ pictures/icons/symbols as input during an authentication... more
    • by 
    •   6  
      Graphical PasswordPasswordsShoulder surfingAuthentication Scheme
Passwords are a good idea, in theory. They have the potential to act as a fairly strong gateway. In practice though, passwords are plagued with problems. They are (1) easily shared, (2) trivial to observe and (3) maddeningly elusive when... more
    • by 
    •   6  
      Human Computer InteractionUsabilityAuthenticationGraphical Password Authentication
    • by 
    •   3  
      AuthenticationPdaShoulder surfing
    • by 
    •   6  
      Eye trackingTouch ScreenBit Error RateUser Study
    • by 
    •   5  
      AuthenticationGraphical PasswordShoulder surfingSecurity Assessment
    • by 
    •   4  
      Computer ScienceAutobiographical MemoryGraphical PasswordsShoulder surfing
Clients regularly reuse the same customized recognizable proof numeric system for various sessions. Coordinate numeric sections can be profoundly powerless for the bear to break assaults and assailants can successfully watch PIN section... more
    • by 
    •   9  
      Information SecurityData MiningNetwork SecuritySecurity
In today's world of E-Commerce everything comes online like Music,E-Books, Shopping all most everything is online. If you are using some service or buying things online then you have to pay for that. For that you have to do Net Banking or... more
    • by 
    •   8  
      Image Forgery DetectionElectronic PaymentsProtocolsPhishing
Graphical passwords effectively used in authentication system to prevent unauthorized access to mobile device. The security of these mobile devices are limited by shoulder surfing, it refer to direct observation techniques... more
    • by 
    •   4  
      AuthenticationGraphical PasswordShoulder surfingSecurity Password