2018
DOI: 10.1109/tdsc.2016.2539942
|View full text |Cite
|
Sign up to set email alerts
|

A Shoulder Surfing Resistant Graphical Authentication System

Abstract: The authentication based on the passwords is used mostly in applications for the computer security and privacy. However, the human actions such as selecting less secured passwords credentials and inputting passwords in an insecure way are considered "the weakest link" within the authentication chain. Instead of arbitrary alphanumeric strings, users tend to select passwords either short or purposeful for simple memorization. With internet applications and mobile apps pile up, individuals will access these appli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 76 publications
(44 citation statements)
references
References 28 publications
0
44
0
Order By: Relevance
“…To this day, it is relatively common to find papers advertising a novel method as shoulder surfing resistant, though most of them do not explore that aspect beyond theoretical rationale [28][52] [42]. Some of them identify the investigation of the method's resistance as a plausible direction for future research [29], or even presume the method is safe against the attack by the virtue of its design [24][37] [43]. This section focuses on the papers that examined shoulder surfing attacks from an empirical perspective.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To this day, it is relatively common to find papers advertising a novel method as shoulder surfing resistant, though most of them do not explore that aspect beyond theoretical rationale [28][52] [42]. Some of them identify the investigation of the method's resistance as a plausible direction for future research [29], or even presume the method is safe against the attack by the virtue of its design [24][37] [43]. This section focuses on the papers that examined shoulder surfing attacks from an empirical perspective.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [4], the authors proposed a novel confirmation framework as Pass Matrix dependent on graphical passwords. It has one-time login and circulates a kind of vertical and horizontal bars which makes the pass-images invisible.…”
Section: Existing Workmentioning
confidence: 99%
“…Hung-Minet al in [1] proposes an authentication system that is based on the pass matrix and the pass images. Through the one time login indicator the user will be able to point out the location of pass-square.…”
Section: Related Workmentioning
confidence: 99%