2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2016
DOI: 10.1109/waina.2016.31
|View full text |Cite
|
Sign up to set email alerts
|

Graphical Passwords -- A Discussion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(21 citation statements)
references
References 13 publications
0
21
0
Order By: Relevance
“…Another alternative to alphanumeric passwords is graphical passwords [ 8 , 11 , 22 ]. There has been a degree of consensus regarding their viability, with a minor agreement that they outperform alphanumeric passwords [ 8 , 11 , 22 ]. Graphical passwords are typically sorted into three categories; recall, cued-recall, and recognition.…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
See 2 more Smart Citations
“…Another alternative to alphanumeric passwords is graphical passwords [ 8 , 11 , 22 ]. There has been a degree of consensus regarding their viability, with a minor agreement that they outperform alphanumeric passwords [ 8 , 11 , 22 ]. Graphical passwords are typically sorted into three categories; recall, cued-recall, and recognition.…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
“…Graphical passwords are typically sorted into three categories; recall, cued-recall, and recognition. Methodology can range from drawing an image (e.g., a signature), clicking or ordering images, selecting points on a given image, or various other graphical methods [ 22 ]. Often these systems rely on highly specific software dependencies which are not always viable for wider implementation.…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Other usability drawbacks of this scheme are to scan multiple images to identify a few preselected images for the password, which is considered as a time-consuming process. 8 In pure-recall based authentication system, users have to reproduce or draw something as their password. Pure-recall based schemes address the drawbacks of recognition based schemes but are prone to errors when a stylus is not used.…”
Section: Introductionmentioning
confidence: 99%
“…6,9 The recall-based systems are less vulnerable to dictionary, brute-force and social engineering attacks than text-based passwords because imitating human inputs by automatically generating mouse motions is difficult. 8 However, the problem with pure-recall based schemes is the users can hardly remember the sequence of drawing after a period. Additionally, it is challenging to reproduce the drawing same as the original password.…”
Section: Introductionmentioning
confidence: 99%