A Design and Analysis of Graphical Password

A Design and Analysis of Graphical Password
Author:
Publisher:
Total Pages:
Release: 2006
Genre: Authentication
ISBN:


Download A Design and Analysis of Graphical Password Book in PDF, Epub and Kindle

The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem, some researchers have developed authentication methods that use pictures as passwords. In this paper, I conduct a comprehensive survey of the existing graphical password techniques. I classify these techniques into two categories: recognition-based and recall-based approaches. I discuss the strengths and limitations of each method and point out the future research directions in this area. I also developed three new techniques against the common problem exists in the present graphical password techniques. In this thesis, the scheme of each new technique will be proposed; the advantages of each technique will be discussed; and the future work will be anticipated.


A Design and Analysis of Graphical Password
Language: en
Pages:
Authors:
Categories: Authentication
Type: BOOK - Published: 2006 - Publisher:

GET EBOOK

The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For e
Digital Information and Communication Technology and Its Applications
Language: en
Pages: 818
Authors: Hocine Cherifi
Categories: Computers
Type: BOOK - Published: 2011-06-14 - Publisher: Springer Science & Business Media

GET EBOOK

This two-volume set CCIS 166 and CCIS 167 constitutes the refereed proceedings of the International Conference on Digital Information and Communication Technolo
A NOVEL APPROACH OF AUTHENTICATION USING PIXEL VALUE GRAPHICAL PASSWORD SCHEME
Language: en
Pages: 123
Authors: MOHD SHUKRAN MOHD AFIZI
Categories: Computers
Type: BOOK - Published: 2015-03-31 - Publisher: Anchor Academic Publishing (aap_verlag)

GET EBOOK

In decades, authentication system is relying on username and password as passphrase object for authentication process. The username and password mechanism bring
Imagery and Verbal Processes
Language: en
Pages: 609
Authors: A. Paivio
Categories: Psychology
Type: BOOK - Published: 2013-11-26 - Publisher: Psychology Press

GET EBOOK

First published in 1978. In this book the author has attempted to present a systematic theoretical and factual account of the role of higher mental processes in
Algorithms and Architectures for Parallel Processing, Part II
Language: en
Pages: 431
Authors: Yang Xiang
Categories: Computers
Type: BOOK - Published: 2011-10-07 - Publisher: Springer Science & Business Media

GET EBOOK

This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parall