A review of graphical authentication utilising a keypad input method

H Alsaiari, M Papadaki, PS Dowland… - Proceedings of the …, 2016 - World Scientific
The traditional password has long been the most widely used authentication mechanism in
spite of its well-known flaws. In order to address these flaws, researchers have utilised …

[PDF][PDF] User authentication using native language passwords

S Malempati, S Mogalla - International Journal of Network Security & Its …, 2011 - Citeseer
Information security is necessary for any organization. Intrusion prevention is the basic level
of security which requires user authentication. User can be authenticated to a machine by …

Gas: A novel grid based authentication system

N Gowraj, S Avireddy, S Prabhu - … 2013, Greader Noida, India, January 11 …, 2013 - Springer
With the evolving trends in technology, providing security for the users is an essential goal of
the application. Authentication is one such important aspect of security which provides …

A graphic-based cryptographic model for authentication

BK Alese, A Akindele, FM Dahunsi… - … On Cyber Situational …, 2017 - ieeexplore.ieee.org
Conventional password has been used for authentication for a long time due to its
advantages. However, it drawbacks such as weak or unrecalled passwords has frequently …

[PDF][PDF] A Comprehensive Survey on Graphical Passwords and shoulder surfing resistant technique analysis

J Thirupathi - vol, 2015 - ijiset.com
For any organization, it is essential to protect its all private resources from security threats
from all over the world. The most general computer authentication method is to use …

[PDF][PDF] INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

TK Das, DK Mahapatra, G Pradhan - Journal Impact Factor, 2012 - academia.edu
In current scenario, business enterprises are required to deliver improved functionality and
provide on-demand services, while leveraging existing IT infrastructure and investment …

Performance of media based information leakage protection

V Venktachalam, JH Park - 2013 IEEE Pacific Rim Conference …, 2013 - ieeexplore.ieee.org
There are many occasions that an organization needs to distribute important data to only
authorized agents. However, there might happen illegal interceptions of the data by …

[引用][C] 具登入記錄攻擊輕度抵擋能力的高使用性圖形化文字通行碼的設計與分析

陳奕綸 - 2013

[引用][C] 具登入記錄攻擊抵擋能力之圖形化通行碼的設計與進階分析

陳維屏 - 2012