Abstract- Shoulder surfing is biggest problem faced by security system nowadays. The attacker observes the user while entering the password and forges the password. This is called as Shoulder surfing. In this paper we have surveyed the existing solutions and problems dealing with shoulder surfing. We have made analysis of various schemes and have found their pros and cons. Most of the systems are not either secure or efficient. We have proposed one secure and efficient scheme.We have made analysis of its performance against accidental login and password space i.e. usability
In order to prevent intruders from looking into sensitive data in smartphones users will have their ...
Information Security is the most describing problem in present times. To cop up with the security of...
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety...
Traditional passwords are difficult to remember and vulnerable to shoulder-surfing attacks. A graphi...
The focus of this report is to discuss graphical password systems and how they can contribute to han...
Authentication is a process that ensures a user’s identity. User’s identity can be verified by user ...
Graphical passwords are often considered prone to shoulder-surfing attacks, where attackers can stea...
Abstract—Researchers have been trying to improve authentication for a long time. User still uses tex...
AbstractNowadays computer as well as information security is the most significant challenge. Authori...
Authentication is the process of allowing an authorized user to access a computer system. The common...
AbstractGraphical passwords consist of selecting images or drawing symbols rather than entering text...
Graphical passwords are a method of authentication in computer security. Computer security is one of...
Graphical password schemes are believed to be more secure and more resilient to dictionary attacks t...
Nowadays, purchase rate of the smart device is increasing and user authentication is one of the impo...
Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or b...
In order to prevent intruders from looking into sensitive data in smartphones users will have their ...
Information Security is the most describing problem in present times. To cop up with the security of...
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety...
Traditional passwords are difficult to remember and vulnerable to shoulder-surfing attacks. A graphi...
The focus of this report is to discuss graphical password systems and how they can contribute to han...
Authentication is a process that ensures a user’s identity. User’s identity can be verified by user ...
Graphical passwords are often considered prone to shoulder-surfing attacks, where attackers can stea...
Abstract—Researchers have been trying to improve authentication for a long time. User still uses tex...
AbstractNowadays computer as well as information security is the most significant challenge. Authori...
Authentication is the process of allowing an authorized user to access a computer system. The common...
AbstractGraphical passwords consist of selecting images or drawing symbols rather than entering text...
Graphical passwords are a method of authentication in computer security. Computer security is one of...
Graphical password schemes are believed to be more secure and more resilient to dictionary attacks t...
Nowadays, purchase rate of the smart device is increasing and user authentication is one of the impo...
Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or b...
In order to prevent intruders from looking into sensitive data in smartphones users will have their ...
Information Security is the most describing problem in present times. To cop up with the security of...
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety...