2021
DOI: 10.1109/access.2020.3049052
|View full text |Cite
|
Sign up to set email alerts
|

A Simple and Secure Reformation-Based Password Scheme

Abstract: The electronic applications of financial institutions like banks and insurance companies use either token-based, biometric-based, or knowledge-based password scheme to keep the confidential information of their customers safe from hackers. The knowledge-based password scheme's resistance, particularly its reformation-based password scheme against shoulder surfing attacks, is comparatively better than the other two because its password can be entered in crowded places without fear of shoulder surfers. However, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…Usability evaluation of existing and novel systems: Contributions belonging to this category seem to be characterized by two main approaches to evaluating the products/methods: authors either evaluate them individually [20,25,27,29,[34][35][36][37] or compare them with other existing or new systems [4,[13][14][15][16][17][18][19]22,24,26,28,30,32,33,[38][39][40][41].…”
Section: Usability Of Authentication Methods (34 Papers)mentioning
confidence: 99%
See 1 more Smart Citation
“…Usability evaluation of existing and novel systems: Contributions belonging to this category seem to be characterized by two main approaches to evaluating the products/methods: authors either evaluate them individually [20,25,27,29,[34][35][36][37] or compare them with other existing or new systems [4,[13][14][15][16][17][18][19]22,24,26,28,30,32,33,[38][39][40][41].…”
Section: Usability Of Authentication Methods (34 Papers)mentioning
confidence: 99%
“…Another critical issue shared by many articles belonging to this cluster is the creation and use of custom measures to evaluate the usability of the products and systems studied, such as code length [15] or typing effort [39], exclusively related to the specific tool used. This highlights a methodological weakness, forgoing the golden standards for usability assessment and making the studies often not comparable.…”
Section: Usability Of Authentication Methods (34 Papers)mentioning
confidence: 99%
“…The knowledge-based password still provides extendable usability and security features. It can be comparable to the token and biometrics security levels with respect to mitigating most of the usability issues and security threats [1], [109]. Textual passwords are relatively still the most usable passwords because their ease of use, lack of hardware required, and less required storage [110].…”
Section: Comparative Analysis Of Knowledge-based Passwords Tokens And...mentioning
confidence: 99%
“…The biggest challenge for several companies is to establish an authentication technique that offers a high level of usability and security. Authentication systems can be classified into three main types: knowledge-based, token-based, and biometric [1], [2]. Large corporations and banks have recently switched to the use of biometrics or token passwords to verify individuals' identities, but these passwords require expensive hardware and high-complexity algorithms [3]- [5].…”
Section: Introductionmentioning
confidence: 99%
“…Shoulder surfing being a real threat to authentication systems is of two types, i.e., weak and strong shoulder surfing attacks. In the first one, an attacker directly observes the authentication mechanism, whereas in the latter one, the attacker uses any hardware device, i.e., recording camera [35]. Textual passwords are slightly unprotected and are easily attackable that's why they are considered to be the weakest link in authentication chain [36,37].…”
Section: Shoulder Surfing and Smudge Attacksmentioning
confidence: 99%