2019
DOI: 10.48550/arxiv.1907.05406
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Using Chinese Characters To Generate Text-Based Passwords For Information Security

Bing Yao,
Yarong Mu,
Yirong Sun
et al.

Abstract: Graphical passwords (GPWs) are in many areas of the current world, in which the two-dimensional code has been applied successfully nowadays. Topological graphic passwords (Topsnut-gpws) are a new type of cryptography, and they differ from the existing GPWs. A Topsnut-gpw consists of two parts: one is a topological structure (graph), and one is a set of discrete elements (a graph labelling, or coloring), the topological structure connects these discrete elements together to form an interesting "story". It is no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Theorem 8. [30] Every connected graph admits a v-set e-proper graceful labeling defined in Definition 11. Theorem 9.…”
Section: Definition 14mentioning
confidence: 99%
“…Theorem 8. [30] Every connected graph admits a v-set e-proper graceful labeling defined in Definition 11. Theorem 9.…”
Section: Definition 14mentioning
confidence: 99%
“…If the matrix in problem has been found, it is difficult to guess the desired graphs, since it will meet NP-hard problems, such as, Graph Isomorphic Problem, and Hanzi-graph Decomposition Problem (Ref. [14]).…”
Section: The Complexity Of Nsd-ghpmentioning
confidence: 99%