Graphical Passwords: Requisite for Secure Information Systems

被引:0
|
作者
Abbasi, Kashif [1 ]
Zin, Abdullah Mohd [1 ]
Mokhtar, Mohd Rosmadi [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol FTSM, Bangi, Malaysia
关键词
Information Security; User Authentication; Graphical Passwords; Security Attacks;
D O I
10.1166/asl.2016.7114
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Security of information systems is the basic need of the day. In the present world of information technology, survival of a business is possible only through e-commerce and web based applications. With the fast growing businesses and demand of the intelligent systems, security threats and security attacks have also enhanced. This paper discusses latest security problems and threats faced by information systems. We have focused on measures to develop a secure information system through graphical authentication mechanism. Graphical passwords provide alternative method to normal text based passwords. They are considered modern authentication technique for secure information systems. In this paper, we have compared various graphical authentication methods and their problems. In the end, solutions to these security problems are given in the discussion section.
引用
收藏
页码:2809 / 2813
页数:5
相关论文
共 50 条
  • [1] Secure Human Authentication with Graphical Passwords
    Dagvatur, Zayabaatar
    Mohaisen, Aziz
    Lee, Kyunghee
    Nyang, DaeHun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1247 - 1259
  • [2] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [3] On Automated Image Choice for Secure and Usable Graphical Passwords
    Dunphy, Paul
    Olivier, Patrick
    [J]. 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 99 - 108
  • [4] Graphical Passwords - A Discussion
    Kayem, Anne V. D. M.
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 596 - 600
  • [5] Graphical passwords: A survey
    Suo, XY
    Zhu, Y
    Owen, GS
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 419 - 428
  • [6] Graphical dictionaries and the memorable space of graphical passwords
    Thorpe, J
    van Oorschot, PC
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 135 - 150
  • [7] Captcha As Graphical Passwords-Enhanced With Video-Based Captcha For Secure Services
    Anjitha, K.
    Rijin, I. K.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 213 - 217
  • [8] The design and analysis of graphical passwords
    Jermyn, I
    Mayer, A
    Monrose, F
    Reiter, MK
    Rubin, AD
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 1 - 14
  • [9] Synthesis of Secure Passwords
    Sato, Tomoki
    Kikuchi, Hiroaki
    [J]. PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 35 - 43
  • [10] The Presentation Effect on Graphical Passwords
    Thorpe, Julie
    Al-Badawi, Muath
    MacRae, Brent
    Salehi-Abari, Amirali
    [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2947 - 2950