2018 8th International Conference on Computer Science and Information Technology (CSIT) 2018
DOI: 10.1109/csit.2018.8486188
|View full text |Cite
|
Sign up to set email alerts
|

A New Password Authentication Mechanism Using 2D Shapes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Their approach provides more benefits compared to ordinary text-based passwords but does not clearly state how shoulder surfing attacks would be minimized. Moreover, Fayyadh et al [45] present a graphical method that allows the user to create shapes during their registration and thereby required to draw such shapes when accessing the system. Their approach is quite an improvement compared to Bilgi and Tugrul [44].…”
Section: 2results Of Password Biometric Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…Their approach provides more benefits compared to ordinary text-based passwords but does not clearly state how shoulder surfing attacks would be minimized. Moreover, Fayyadh et al [45] present a graphical method that allows the user to create shapes during their registration and thereby required to draw such shapes when accessing the system. Their approach is quite an improvement compared to Bilgi and Tugrul [44].…”
Section: 2results Of Password Biometric Authenticationmentioning
confidence: 99%
“…Table 2 shows the evaluation of password biometric authentication approaches. [45] password authentication graphical password (2D Shapes) effective against the brute force attacks, the dictionary attacks, and the keylogger attacks Difficult to remember the number of used shapes when larger Sudramurthy et al (2017) [51] password authentication…”
Section: 2results Of Password Biometric Authenticationmentioning
confidence: 99%
“…All the user needs to do for authentication is to draw the pattern as shown. B. E. Fayyadh et al [40] in this paper proposes a new hybrid graphical password scheme using two-dimensional (2D) shapes to create passwords. in this new scheme, users are asked to use certain 2D shapes to draw their graphical password during registration.…”
Section: B Drawing Password Authenticationmentioning
confidence: 99%
“…Often these systems rely on highly specific software dependencies which are not always viable for wider implementation. While graphical passwords may circumvent many issues native to alphanumeric passwords—such as brute-forcing, key-logging, and dictionary cyber-attacks—through its introduction of CAPTCHA-based elements, graphical passwords introduce their own set of native issues [ 8 , 11 , 17 , 22 , 23 , 24 , 25 ]. Primarily, deployability of graphical passwords is a continuous topic of debate; while it is usually accepted for ease of implementation on mobile devices, their implementation on web browsers or desktop systems has received scrutiny [ 8 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
“…Primarily, deployability of graphical passwords is a continuous topic of debate; while it is usually accepted for ease of implementation on mobile devices, their implementation on web browsers or desktop systems has received scrutiny [ 8 ]. Depending on the category of graphical passwords implemented, inflation of user responsibility is another serious concern, especially for higher security patterns [ 8 , 23 , 24 ]. Much like biometric passwords, graphical password systems also face the threat of false positives [ 17 , 24 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%