2017
DOI: 10.14569/ijacsa.2017.080771
|View full text |Cite
|
Sign up to set email alerts
|

A Text based Authentication Scheme for Improving Security of Textual Passwords

Abstract: Abstract-User authentication through textual passwords is very common in computer systems due to its ease of use. However textual passwords are vulnerable to different kinds of security attacks, such as spyware and dictionary attacks. In order to overcome the deficiencies of textual password scheme, many graphical password schemes have been proposed. The proposed schemes could not fully replace textual passwords, due to usability and security issues. In this paper a text based user authentication scheme is pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(17 citation statements)
references
References 16 publications
0
17
0
Order By: Relevance
“…In [10], a text-based authentication scheme was introduced. Nine to ten different characters are attached to each numeric digit.…”
Section: A Reformation Based Password Schemesmentioning
confidence: 99%
See 4 more Smart Citations
“…In [10], a text-based authentication scheme was introduced. Nine to ten different characters are attached to each numeric digit.…”
Section: A Reformation Based Password Schemesmentioning
confidence: 99%
“…The aforementioned reformable approaches improved the security using extra devices [5], [21], high cognitive overhead [5], [9], [12], [13], multiple interfaces for each character of password [6], focusing on the client-side and not providing server-side database security [5]- [7], [10]- [13], [21]. However, they are losing usability due to complex interfaces as in [5], [9], [10] and extra keys entry against each password character [5], [9], [11], [12]. Additionally, the use of different devices (earphones) in [5], [21] acts as a threat to security if its sound is leaked out.…”
Section: Brute Force Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations