Universal Multi-Factor Authentication Using Graphical Passwords

被引:26
|
作者
Sabzevar, Alireza Pirayesh [1 ]
Stavrou, Angelos [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
关键词
D O I
10.1109/SITIS.2008.92
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we present a series of methods to authenticate a user with a graphical password. To that end, we employ the user's personal handheld device as the password decoder and the second factor of authentication. In our methods, a service provider challenges the user with an image password. To determine the appropriate click points and their order, the user needs some hint information transmitted only to her handheld device. We show that our method can overcome threats such as key-loggers, weak password, and shoulder surfing. With the increasing popularity, of handheld devices such as cell phones, our approach can be leveraged by many organizations without forcing the user to memorize different passwords or carrying around different tokens.
引用
收藏
页码:625 / 632
页数:8
相关论文
共 50 条
  • [1] Framework for Multi-factor Authentication with Dynamically Generated Passwords
    Chenchev, Ivaylo
    [J]. ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 563 - 576
  • [2] Beyond passwords: A multi-factor authentication approach for robust digital security
    Simha, R. Keerthan
    Raghavan, H. K.
    Prabhu, Akshatha
    Joshi, Pallavi
    [J]. INTERNET TECHNOLOGY LETTERS, 2024,
  • [3] Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential
    Nozaki, Shinnosuke
    Serizawa, Ayumi
    Yoshihira, Mizuho
    Fujita, Masahiro
    Shibata, Yoichi
    Yamanaka, Tadakazu
    Matsuda, Nori
    Ohki, Tetsushi
    Nishigaki, Masakatsu
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 201 - 211
  • [4] CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and Passwords
    Han, Jinho
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (12):
  • [5] Multi-Factor Authentication Using Threshold Cryptography
    Venukumar, Vishnu
    Pathari, Vinod
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1694 - 1698
  • [6] MULTI-FACTOR AUTHENTICATION MODELLING
    Dostalek, L.
    Safarik, J.
    [J]. RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2020, (02) : 106 - 116
  • [7] Multi-Factor Authentication as a Service
    Shah, Yogendra
    Choyi, Vinod
    Schmidt, Andreas U.
    Subramanian, Lakshmi
    [J]. 2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 144 - 150
  • [8] Multi-Factor Authentication Modeling
    Dostalek, Libor
    [J]. 2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446
  • [9] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211
  • [10] Bypassing Multi-Factor Authentication
    Russell, Steve
    [J]. ITNOW, 2023, 65 (01) : 42 - 45