Ghiyamipour, 2021 - Google Patents
Secure graphical password based on cued click points using fuzzy logicGhiyamipour, 2021
- Document ID
- 1663868836118827038
- Author
- Ghiyamipour F
- Publication year
- Publication venue
- Security and Privacy
External Links
Snippet
Nowadays authentication technology is the most important means to ensure security. Alphanumeric username and password procedure is the most common authentication method. Users typically choose memorable passwords that are easy for attackers to guess …
- 238000000034 method 0 abstract description 50
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Afroz et al. | Phishzoo: Detecting phishing websites by looking at them | |
Cavoukian et al. | Advances in biometric encryption: Taking privacy by design from academic research to deployment | |
Polakis et al. | Faces in the distorting mirror: Revisiting photo-based social authentication | |
Gomez‐Barrero et al. | Predicting the vulnerability of biometric systems to attacks based on morphed biometric information | |
Ghiyamipour | Secure graphical password based on cued click points using fuzzy logic | |
Ogiela et al. | Application of knowledge‐based cognitive CAPTCHA in Cloud of Things security | |
Rochet et al. | SWAT: seamless web authentication technology | |
Alkhowaiter et al. | Evaluating perceptual hashing algorithms in detecting image manipulation over social media platforms | |
Kavitha et al. | Enhancing digital security: a comprehensive multi-model authentication framework leveraging cryptography and biometrics | |
Nanglae et al. | ProCAPTCHA: A profile-based CAPTCHA for personal password authentication | |
Abbas et al. | Pass point selection of automatic graphical password authentication technique based on histogram method | |
Kolekar et al. | Click and session based—Captcha as graphical password authentication schemes for smart phone and web | |
Soares et al. | On the Application of Synthetic Media to Penetration Testing | |
Xu et al. | IB2P: An image-based privacy-preserving blockchain model for financial services | |
Yesseyeva et al. | Tri-Pass: A new graphical user authentication scheme | |
Lashkari et al. | A survey on usability and security features in graphical user authentication algorithms | |
Kaur et al. | Biometric-based key handling using speeded up robust features | |
Wang et al. | Time evolving graphical password for securing mobile devices | |
Kaur et al. | Remote multimodal biometric authentication using visual cryptography | |
Poornananda Bhat et al. | Two-way image based CAPTCHA | |
Barati | Security Threats and Dealing with Social Networks | |
Meraoumia et al. | Biometric cryptosystem to secure smart object communications in the internet of things | |
He et al. | Identity Deepfake Threats to Biometric Authentication Systems: Public and Expert Perspectives | |
Thorawade et al. | Authentication scheme resistant to shoulder surfing attack using image retrieval | |
Xiao et al. | Pivot: Panoramic-Image-Based VR User Authentication against Side-Channel Attacks |