Graphical Passwords: Requisite for Secure Information Systems

被引:0
|
作者
Abbasi, Kashif [1 ]
Zin, Abdullah Mohd [1 ]
Mokhtar, Mohd Rosmadi [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol FTSM, Bangi, Malaysia
关键词
Information Security; User Authentication; Graphical Passwords; Security Attacks;
D O I
10.1166/asl.2016.7114
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Security of information systems is the basic need of the day. In the present world of information technology, survival of a business is possible only through e-commerce and web based applications. With the fast growing businesses and demand of the intelligent systems, security threats and security attacks have also enhanced. This paper discusses latest security problems and threats faced by information systems. We have focused on measures to develop a secure information system through graphical authentication mechanism. Graphical passwords provide alternative method to normal text based passwords. They are considered modern authentication technique for secure information systems. In this paper, we have compared various graphical authentication methods and their problems. In the end, solutions to these security problems are given in the discussion section.
引用
收藏
页码:2809 / 2813
页数:5
相关论文
共 50 条
  • [41] Sesame: A Secure and Convenient Mobile Solution for Passwords
    Aliasgari, Mehrdad
    Sabol, Nick
    Sharma, Ashutosh
    [J]. 2015 1ST CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2015, : 36 - 40
  • [42] Is it Better to Choose Seen or Unseen Distracters for Graphical Passwords
    Ashraf, Abdul
    Poet, Ron
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [43] Optimal Discretization for High-Entropy Graphical Passwords
    Bicakci, Kemal
    [J]. 23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 48 - 53
  • [44] A Preliminary Study to Evaluate Graphical Passwords for Older Adults
    Jittibumrungrak, Paranya
    Hongwarittorrn, Nuttanont
    [J]. PROCEEDINGS OF CHIUXID 2019: 5TH INTERNATIONAL ACM IN-COOPERATION HCI AND UX CONFERENCE, 2019, : 88 - 95
  • [45] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
    Saadi, Zena Mohammad
    Sadiq, Ahmed T.
    Akif, Omar Z.
    Farhan, Alaa K.
    [J]. ELECTRONICS, 2024, 13 (15)
  • [46] A Protocol of Quantum Authentication with Secure Quantum Passwords
    Hotta, Masahiro
    Ozawa, Masanao
    [J]. QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING (QCMC), 2009, 1110 : 388 - +
  • [47] On predictive models and user-drawn graphical passwords
    Van Oorschot, P. C.
    Thorpe, Julie
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
  • [48] Click to Enter: Comparing Graphical and Textual Passwords for Children
    Cole, Jasper
    Walsh, Greg
    Pease, Zachary
    [J]. PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INTERACTION DESIGN AND CHILDREN (IDC 2017), 2017, : 472 - 477
  • [49] A Human Factors Study of Graphical Passwords Using Biometrics
    Riggan, Benjamin S.
    Snyder, Wesley E.
    Wang, Xiaogang
    Feng, Jing
    [J]. PATTERN RECOGNITION, GCPR 2014, 2014, 8753 : 464 - 475
  • [50] Implementation of Graphical Passwords in Internet Banking for Enhanced Security
    Razvi, Salma Abid
    Neelima, S.
    Prathyusha, C.
    Yuvasree, G.
    Ganga, C.
    Kumar, K. Manoj
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 35 - 41