2023
DOI: 10.13005/ojcst16.01.03
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison Between Position-Based and Image-Based Multi-Layer Graphical user Authentication System

Audu Lovingkindness Edward,
Hassan Suru,
Mustapha Abubakar Giro­

Abstract: System security is very important, especially in the age that we live in. One of the ways to secure data is by creating a password that makes it difficult for unauthorized user to gain access to the system. However, what makes it difficult for the system to be attacked is directly dependent on approach used to create it, and how secured it is. Text based approach is the oldest authentication approach. It requires that the user supplies textual password in order to gain access to the system. However, this appro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Nearly no new approaches or schemes on GP for web apps were done between 2016 and 2020, and researchers preferred to use GP in cloud computing and mobile computing instead [18][19][20][21][22][23][24]. They tended to improve the GP for cloud services and web applications start in 2020 [1,18,19,[22][23][24][25][26][27][28][29].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Nearly no new approaches or schemes on GP for web apps were done between 2016 and 2020, and researchers preferred to use GP in cloud computing and mobile computing instead [18][19][20][21][22][23][24]. They tended to improve the GP for cloud services and web applications start in 2020 [1,18,19,[22][23][24][25][26][27][28][29].…”
Section: Related Workmentioning
confidence: 99%
“…Cloud computing is an internet service environment using shared information, resources, software, and hardware per user's demand or company's request to access their data from anywhere or at any time. So, The GP schemes used for web applications can be used for cloud computing to successfully authenticate users before they take the privilege to access their resources or data [1,[18][19]22].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations