[go: up one dir, main page]

Ghiyamipour, 2021 - Google Patents

Secure graphical password based on cued click points using fuzzy logic

Ghiyamipour, 2021

Document ID
1663868836118827038
Author
Ghiyamipour F
Publication year
Publication venue
Security and Privacy

External Links

Snippet

Nowadays authentication technology is the most important means to ensure security. Alphanumeric username and password procedure is the most common authentication method. Users typically choose memorable passwords that are easy for attackers to guess …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Afroz et al. Phishzoo: Detecting phishing websites by looking at them
Cavoukian et al. Advances in biometric encryption: Taking privacy by design from academic research to deployment
Polakis et al. Faces in the distorting mirror: Revisiting photo-based social authentication
Gomez‐Barrero et al. Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Ghiyamipour Secure graphical password based on cued click points using fuzzy logic
Ogiela et al. Application of knowledge‐based cognitive CAPTCHA in Cloud of Things security
Rochet et al. SWAT: seamless web authentication technology
Alkhowaiter et al. Evaluating perceptual hashing algorithms in detecting image manipulation over social media platforms
Kavitha et al. Enhancing digital security: a comprehensive multi-model authentication framework leveraging cryptography and biometrics
Nanglae et al. ProCAPTCHA: A profile-based CAPTCHA for personal password authentication
Abbas et al. Pass point selection of automatic graphical password authentication technique based on histogram method
Kolekar et al. Click and session based—Captcha as graphical password authentication schemes for smart phone and web
Soares et al. On the Application of Synthetic Media to Penetration Testing
Xu et al. IB2P: An image-based privacy-preserving blockchain model for financial services
Yesseyeva et al. Tri-Pass: A new graphical user authentication scheme
Lashkari et al. A survey on usability and security features in graphical user authentication algorithms
Kaur et al. Biometric-based key handling using speeded up robust features
Wang et al. Time evolving graphical password for securing mobile devices
Kaur et al. Remote multimodal biometric authentication using visual cryptography
Poornananda Bhat et al. Two-way image based CAPTCHA
Barati Security Threats and Dealing with Social Networks
Meraoumia et al. Biometric cryptosystem to secure smart object communications in the internet of things
He et al. Identity Deepfake Threats to Biometric Authentication Systems: Public and Expert Perspectives
Thorawade et al. Authentication scheme resistant to shoulder surfing attack using image retrieval
Xiao et al. Pivot: Panoramic-Image-Based VR User Authentication against Side-Channel Attacks