Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points

被引:5
|
作者
Nayak, Atish [1 ]
Bansode, Rajesh [1 ]
机构
[1] TCET, Dept IT, Bombay 400101, Maharashtra, India
关键词
Authentication; usable security; empirical studies; persuasive technology; graphical passwords;
D O I
10.1016/j.procs.2016.03.070
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In general users tend to choose memorable passwords that are easy for attackers to guess, but strong system assigned passwords are hard for users to remember. In this paper focuses on the integrated evaluation of the Persuasive Cued Click Points graphical password system which including usability and security evaluation on three different level. An important goal of authentication systems is support users in selecting better passwords. Increasing security by expanding the value of effective password space. In the click -based graphical passwords, poorly chosen passwords lead to the emergence of hotspots (image portions where users are more likely to select click -points, allowing attackers to mount more successful dictionary attacks). This paper used persuasion to influence user choice is used in click -based graphical passwords for encouraging users to select more random, and hence more difficult to guess, click-points. (C) 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of the Organizing Committee of ICCCV 2016
引用
收藏
页码:553 / 560
页数:8
相关论文
共 50 条
  • [31] Continuous User Authentication System: A Risk Analysis Based Approach
    Neha
    Chatterjee, Kakali
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (01) : 281 - 295
  • [32] Analysis of an eHealth Care System with Smart Card based Authentication
    Yeh, Kuo-Hui
    Lo, N. W.
    Wu, Tzong-Chen
    Yang, Ta-Chi
    Liaw, Horng-Twu
    [J]. PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 59 - 61
  • [33] To Discovery The Cloud Services Authentication An Expert Based System Using Multi-Factor Authentication
    Kumar, G. Senthil
    Kandavel, N.
    Madhavan, K.
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 1014 - 1016
  • [34] Multi-graph Zero-knowledge-based Authentication System in Internet of Things
    Chuang, I-Hsun
    Guo, Bing-Jie
    Tsai, Jen-Sheng
    Kuo, Yau-Hwang
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [35] Zero-knowledge-based user authentication technique in context-aware system
    Wang, Chun-Dong
    Feng, Li-Chun
    Wang, Qiang
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 874 - +
  • [36] Tipping points of the earth climate system - State of knowledge, Risk analysis and prevention
    Du Vachat, R. Juvanon
    [J]. GEOGRAPHIA TECHNICA, 2009, 4 (02): : 257 - 262
  • [37] Design of the intelligent learning resources learning system based on the "knowledge points" indexing
    Luo Liming
    Yang Liuqing
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS, 2013, : 264 - 267
  • [38] Analysis and application of knowledge points in English network course teaching by using PageRank
    Deng L.
    [J]. International Journal of Networking and Virtual Organisations, 2023, 28 (2-4) : 415 - 429
  • [39] Bearing selection using a knowledge based system
    Griffin, R.T.
    Winfield, M.J.
    Douglas, S.S.
    [J]. Tribology Series, 1988, 14
  • [40] mVoIP for P2P service based authentication system using AA authentication server
    Ho-Kyung Yang
    Hyun-Jong Cha
    Yong-Ho Kim
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 529 - 538