Sequential Graphical Password Framework for Mobile Devices

被引:0
|
作者
Hui, Liew Tze [1 ]
Bashier, Housam Khalifa [1 ]
Hoe, Lau Siong [1 ]
Kwee, Wee Kouk [1 ]
Abdullah, Mohd Fikri Azli [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Jalan Ayer Keroh Lama, Melaka 75450, Malaysia
关键词
graphical password; security; authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
nowadays, computer systems are very essential for human daily life for its ability to store and retrieve data in a more meaningful way. Thus, the data stored in computer system contains a very critical and important information and therefore, there's a critical needs to put more effort in handling of such data. Based on the traditional method, the most popular authentication way for computer security is using alphanumeric password. However, this type of authentication method come with few drawbacks. In recent years, many new methods have been developed by researchers to overcome the limitation of the password authentication, and one of the most popular method is known as graphical password, which utilizes picture as password instead of the alphanumeric string. Hence, this paper propose a new graphical password framework and method to be used in mobile-platform. Finally, the experiments results demonstrated the effectiveness of the proposed solution.
引用
收藏
页码:194 / 198
页数:5
相关论文
共 50 条
  • [21] Multiple password interference in graphical passwords
    Software Engineering Institute, Xidian University, Xi'an, Shaanxi 710071, China
    Int. J. Inf. Comput. Secur., 2012, 1 (11-27):
  • [22] HapticPoints: The Extended PassPoints Graphical Password
    Ratchasan, Trust
    Wiangsripanawan, Rungrat
    INFORMATION SECURITY APPLICATIONS, WISA 2018, 2019, 11402 : 16 - 28
  • [23] On user choice in graphical password schemes
    Davis, D
    Monrose, F
    Reiter, MK
    USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 151 - 163
  • [24] Password Recovery Using Graphical Method
    Kharudin, Wafa' Mohd
    Din, Nur Fatehah Md
    Jali, Mohd Zalisham
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 11 - 20
  • [25] Graphical Password: Prototype Usability Survey
    Eljetlawi, Ali Mohamed
    Ithnin, Norafida
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 351 - +
  • [26] Graphical Password Using an Intuitive Approach
    Mahey, Rajat
    Singh, Nimish
    Kumar, Chandan
    Bhagwat, Nitin
    Verma, Poonam
    INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND APPLICATIONS, ICICA 2016, 2018, 632 : 153 - 161
  • [27] Requirements for Secure Graphical Password Schemes
    Rasekgala, Mokgadi
    Ewert, Sigrid
    Sanders, Ian
    Fogwill, Thomas
    2014 IST-AFRICA CONFERENCE PROCEEDINGS, 2014,
  • [28] A free drawing graphical password scheme
    Lin, Alice J.
    Cheng, Fuhua
    Computer-Aided Design and Applications, 2009, 6 (04): : 553 - 561
  • [29] Graph Theory Towards Designing Graphical Passwords For Mobile Devices
    Yao, Bing
    Sun, Hui
    Zhang, Xiaohui
    Wang, Hongyu
    Li, Jingwen
    Yan, Guanghui
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 1640 - 1644
  • [30] Presenting large graphical contents on mobile devices - Performance issues
    Rosenbaum, R
    Schumann, H
    Tominski, C
    Innovations Through Information Technology, Vols 1 and 2, 2004, : 371 - 374