Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, I have proposed a new hybrid graphical password based system. The system is a combination of recognition and pure recall based techniques and that offers many advantages over the existing systems and may be more convenient for the user. My approach is resistant to shoulder surfing attack and many other attacks on graphical passwords. This scheme is proposed for smart hand held devices (like smart phones i.e. PDAs, ipod, iphone, etc) which are more handy and convenien...
Usable security has unique usability challenges because the need for security often means that stand...
Due to growing hazards to networked computer system, there is great need for security innovations. A...
User Authentication is a critical component in information security. Several widely used mechanisms ...
In this age of electronic connectivity, where we all face viruses, hackers, eavesdropping and electr...
Information Security is the most describing problem in present times. To cop up with the security of...
Information Security is the most describing problem in present times. To cop up with the security of...
Nowadays, purchase rate of the smart device is increasing and user authentication is one of the impo...
AbstractNowadays computer as well as information security is the most significant challenge. Authori...
Considering the popularity and wide deployment of text passwords, we predict that they will be used ...
In many smart devices and numerous digital applications, authentication mechanisms are widely used t...
Recently, smartphones have emerged into a widely used as an input device for Graphical Password Tech...
Memorability and security of passwords are two distinct extremes that are difficult to achieve at th...
Security in the computer is largely supported by the passwords for authentication process. The commo...
Recently, graphical passwords have become a viable alternative to the conventional passwords due to ...
Despite numerous efforts, developing an authentication scheme that offers strong security while offe...
Usable security has unique usability challenges because the need for security often means that stand...
Due to growing hazards to networked computer system, there is great need for security innovations. A...
User Authentication is a critical component in information security. Several widely used mechanisms ...
In this age of electronic connectivity, where we all face viruses, hackers, eavesdropping and electr...
Information Security is the most describing problem in present times. To cop up with the security of...
Information Security is the most describing problem in present times. To cop up with the security of...
Nowadays, purchase rate of the smart device is increasing and user authentication is one of the impo...
AbstractNowadays computer as well as information security is the most significant challenge. Authori...
Considering the popularity and wide deployment of text passwords, we predict that they will be used ...
In many smart devices and numerous digital applications, authentication mechanisms are widely used t...
Recently, smartphones have emerged into a widely used as an input device for Graphical Password Tech...
Memorability and security of passwords are two distinct extremes that are difficult to achieve at th...
Security in the computer is largely supported by the passwords for authentication process. The commo...
Recently, graphical passwords have become a viable alternative to the conventional passwords due to ...
Despite numerous efforts, developing an authentication scheme that offers strong security while offe...
Usable security has unique usability challenges because the need for security often means that stand...
Due to growing hazards to networked computer system, there is great need for security innovations. A...
User Authentication is a critical component in information security. Several widely used mechanisms ...