Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern Lock

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Shoulder Surfing attack in graphical password authentication

Information and computer security is supported largely by passwords which are the principle part of the authentication process. The most common computer authentication method is to use alphanumerical username and password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solut...

متن کامل

Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass

This paper explores options to the built-in authentication mechanism of the Google Glass which is vulnerable to shoulder surfing attacks. Two simple PIN-based authentication techniques are presented, both of which provide protection against shoulder surfing. The techniques employ two interfaces for entering the PIN, namely, voice (Voice-based PIN) and touchpad (Touch-based PIN). To enter the sa...

متن کامل

A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection

Although image-based user authentication systems have gotten a lot of attention recently to reduce the burden of memorizing passwords, they can be vulnerable to shouldersurfing attacks. To overcome this problem, shoulder-surfingresistant image-based authentications with indirect image selection (indirect image-based authentication, or I-IBA) have been proposed. However, because they spatially a...

متن کامل

A Review on Shoulder Surfing Attack in Authentication Technique

Security is a important factor in computer system now a days. Users of computer system give a primary preference to security. Authentication is a process used to provide security to the user. Authentication is a process of identifying the person’s identity or conforming the identity of a particular person. There are various authentication method, but most commonly used method is textual passwor...

متن کامل

Gaze-Assisted User Authentication to Counter Shoulder-surfing Attacks

A highly secure, foolproof, user authentication system is still a primary focus of research in the field of User Privacy and Security. Shoulder-surfing is an act of spying when an authorized user is logging into a system, and is promoted by a malicious intent of gaining unauthorized access. We present a gaze-assisted user authentication system as a potential solution to counter shouldersurfing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEICE Transactions on Information and Systems

سال: 2018

ISSN: 0916-8532,1745-1361

DOI: 10.1587/transinf.2017mup0012