2017
DOI: 10.1007/s11704-016-5472-z
|View full text |Cite
|
Sign up to set email alerts
|

Graphical password: prevent shoulder-surfing attack using digraph substitution rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(29 citation statements)
references
References 9 publications
0
29
0
Order By: Relevance
“…The process of determining the next pass-image is based on the next registered image and the current pass-image information (pass-image output feedback). The location of the pass-images can be determined using Equation (12).…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The process of determining the next pass-image is based on the next registered image and the current pass-image information (pass-image output feedback). The location of the pass-images can be determined using Equation (12).…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Users are given clues to help them reproduce the registered password [9]. Even though the graphical password is able to improve users' memorability, password spaces are limited, hence its vulnerability is exposed to shoulder-surfing attacks [10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Por et al proposed a method that used digraph substitution rules in 2017 [1] (see Figure 4). During the registration procedure, the user is required to register two images.…”
Section: Related Workmentioning
confidence: 99%
“…Authentication is used to secure systems so that only legitimate users can access them. Authentication can be categorised into three categories: token-based, biometric-based and knowledge-based [1]. Token-based authentication relies on what the users possess (e.g., ID card) to perform authentication, biometric-based authentication relies on users' attributes (e.g., thumbprint) to perform authentication, while knowledge-based authentication relies on what the users know (e.g., alphanumeric password) to perform authentication [1][2][3][4][5][6][7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…This scheme is tested to be robust against shoulder surfing attack but has high complexity and is not user-friendly. L. Y. Por et al [13] presents a password scheme that is based on "digraph substitution rules" that hides the activity performed to drive the password images. This scheme is resistant against shoulder surfing attacks as user clicks only on one of the pass images instead of both pass-images.…”
Section: Related Workmentioning
confidence: 99%