Yee et al., 2010 - Google Patents
Shoulder surfing resistance using Penup event and neighboring connectivity manipulationYee et al., 2010
View PDF- Document ID
- 8193833958908650722
- Author
- Yee L
- Kiah M
- Publication year
- Publication venue
- Malaysian Journal of Computer Science
External Links
Snippet
Picture-based password has been proposed as an alternative authentication method to replace text-based password. Ensuring the security of picture-based password is not a simple task as picture-based objects are a lot easier to access and remember and can thus …
- 238000011156 evaluation 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dasgupta et al. | Advances in user authentication | |
Gao et al. | Design and analysis of a graphical password scheme | |
Gao et al. | Yagp: Yet another graphical password strategy | |
Sreelatha et al. | Authentication schemes for session passwords using color and images | |
Por et al. | Graphical password: prevent shoulder-surfing attack using digraph substitution rules | |
Mohan et al. | Enhancing home security through visual cryptography | |
Løge | Tell me who you are and i will tell you your unlock pattern | |
Lin et al. | Graphical passwords using images with random tracks of geometric shapes | |
Biddle et al. | Graphical passwords: Learning from the first generation | |
Suo | A design and analysis of graphical password | |
Yee et al. | Shoulder surfing resistance using Penup event and neighboring connectivity manipulation | |
Yang et al. | TIM: Secure and usable authentication for smartphones | |
Roslan et al. | Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection | |
Lashkari et al. | A survey on usability and security features in graphical user authentication algorithms | |
Cherdmuangpak et al. | Two factor image-based password authentication for junior high school students | |
Renaud et al. | Dynahand: Observation-resistant recognition-based web authentication | |
Mohamad et al. | Image based authentication using zero-knowledge protocol | |
Gupta | A new approach of authentication in graphical systems using ASCII submission of values | |
Tangawar et al. | Survey paper on graphical password authentication system in terms of usability and security attribute | |
Vorster et al. | The pattern-richness of graphical passwords | |
Pais et al. | Illusion PIN: tricking the eye to defeat shoulder surfing attack by using hybrid images | |
Devaki et al. | A novel way of ICON based authentication methods | |
Yazid et al. | Pandalock: Variable-pointer rotary-password authentication technique | |
Sangore et al. | Authentication using images and pattern | |
Thirupathi | A comprehensive survey on graphical passwords and shoulder surfing resistant technique analysis |