Joshi, 2013 - Google Patents
Session passwords using grids and colors for web applications and PDAJoshi, 2013
View PDF- Document ID
- 11219341893317838597
- Author
- Joshi N
- Publication year
- Publication venue
- International Journal of Emerging Technology and Advanced Engineering
External Links
Snippet
Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual …
- 239000003086 colorant 0 title abstract description 24
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sabzevar et al. | Universal multi-factor authentication using graphical passwords | |
CN103679436B (en) | A kind of electronic contract security system and method based on biological information identification | |
CN100399737C (en) | data protection method | |
EP2075734A1 (en) | Anonymous biometric tokens | |
US20150067786A1 (en) | Visual image authentication and transaction authorization using non-determinism | |
CN104809490A (en) | Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system | |
US20240364526A1 (en) | Methods and systems for generating and validating uses of digital credentials and other documents | |
JP2009272737A (en) | Secret authentication system | |
Gandhi et al. | Study on security of online voting system using biometrics and steganography | |
Aanjanadevi et al. | Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics. | |
Balayogi et al. | An approach for mitigating cognitive load in password management by integrating QR codes and steganography | |
Joshi | Session passwords using grids and colors for web applications and PDA | |
Gupta et al. | A model for biometric security using visual cryptography | |
Vijayarajan et al. | Bio-key based AES for personalized image cryptography | |
Sarkar et al. | Blockchain-based authenticable (k, n) multi-secret image sharing scheme | |
Trevathan et al. | Remote handwritten signature authentication | |
Weza et al. | A novel model for securing seals using blockchain and digital signature based on quick response codes | |
Abdolrahimpour et al. | A short survey of visual cryptography and secret image sharing techniques and applications | |
Panigrahy et al. | On the privacy protection of biometric traits: palmprint, face, and signature | |
Yassin | Efficiency and flexibility of fingerprint scheme using partial encryption and discrete wavelet transform to verify user in cloud computing | |
Tabaku et al. | Digital Identity Verification in Finance | |
Lin et al. | A tabular steganography scheme for graphical password authentication | |
AlTarawneh et al. | Crypto Key Generation using Contour Graph Algorithm. | |
Dinesh Babu | Cloud Data security enhancements through the biometric and encryption system | |
CN102841991A (en) | Holder certification system, terminal thereof, certification image decomposition device and generation method |