Typing passwords is vulnerable to shoulder-surfing attacks. We proposed a shoulder-surfing resistant scheme embedded in traditional textual passwords in this study. With the proposed scheme, when the password field is on focus, a pattern appears in it as a hint to tell the user how to enter a password. Following the hint, the user needs to skip some characters while typing the password. The characters to be skipped are randomly selected so that an observer will not be able to see the whole password even if the authentication procedure was recorded. We evaluated the proposed scheme in a usability study. Compared to traditional passwords, our scheme achieved a similar level of accuracy while only required marginal additional time to authentic...
Graphical passwords are often considered prone to shoulder-surfing attacks, where attackers can stea...
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety...
The vulnerabilities of the textual password have been well known. Users tend to pick short passwords...
Abstract—Researchers have been trying to improve authentication for a long time. User still uses tex...
Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or b...
Traditional passwords are difficult to remember and vulnerable to shoulder-surfing attacks. A graphi...
The user usually uses password to avoid the attacks like a dictionary attack, brute force attack and...
Authentication based on passwords is used largely in applications for computer security and privacy....
Picture-based password has been proposed as an alternative authentication method to replace text-bas...
Authentication is a process that ensures a user’s identity. User’s identity can be verified by user ...
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as in...
Over the years, various picture-based password systems were proposed to exploit the utility of pict...
Abstract- Shoulder surfing is biggest problem faced by security system nowadays. The attacker observ...
AbstractNowadays computer as well as information security is the most significant challenge. Authori...
Picture-based password has been proposed as an alternative authentication method to replace text-bas...
Graphical passwords are often considered prone to shoulder-surfing attacks, where attackers can stea...
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety...
The vulnerabilities of the textual password have been well known. Users tend to pick short passwords...
Abstract—Researchers have been trying to improve authentication for a long time. User still uses tex...
Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or b...
Traditional passwords are difficult to remember and vulnerable to shoulder-surfing attacks. A graphi...
The user usually uses password to avoid the attacks like a dictionary attack, brute force attack and...
Authentication based on passwords is used largely in applications for computer security and privacy....
Picture-based password has been proposed as an alternative authentication method to replace text-bas...
Authentication is a process that ensures a user’s identity. User’s identity can be verified by user ...
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as in...
Over the years, various picture-based password systems were proposed to exploit the utility of pict...
Abstract- Shoulder surfing is biggest problem faced by security system nowadays. The attacker observ...
AbstractNowadays computer as well as information security is the most significant challenge. Authori...
Picture-based password has been proposed as an alternative authentication method to replace text-bas...
Graphical passwords are often considered prone to shoulder-surfing attacks, where attackers can stea...
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety...
The vulnerabilities of the textual password have been well known. Users tend to pick short passwords...