A More Secure Position Based Graphical Password Authentication
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: We are proposing a new pass-point graphical password authentication by using a simple virtual environment. Our virtual environment is influenced by a social networking site’ s game. In this system, user interacts with the virtual environment and user can generate sequence of interactions according to his /her choice which will gather by a background process. This process decides whether the user is authenticated user or a not, depending on which the system allows or denies accessing the resources. There are many existing authentication schemes are based on a simple pas-point mechanism, most of them are unsuccessful due to the shoulder surfing attacks. The proposed scheme seems sometime similar to the pass-point techniques but it is very much different with respect to the authentication process.
Authors and Affiliations
Mohd. Aqil Khan , YDS Arya , Gaurav Agarwal
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Network security and Intrusion Detection Systems (IDS’s) is an important security related research area. This paper applies K-star algorithm with filtering analysis in order to build a network intrusion detection...
Skill Acquisition: An E-Learning Approach
The attention of the Nigerian Government for over twenty years now has been on youth’s empowerment through skill acquisition for self-realisation and economic independence. The Government and individuals, both in the pas...
ASRMalNets: Acknowledgement Based Secure Routing Scheme for Malicious MANETs
Abstract: A m o b i l e ad hoc network is a wireless commu- nication network, where communicating nodes are notwithin direct transmission range of each other. Since the radio links between t h e nodes b r e a k fre...
A New Skin Color Based Face Detection Algorithm by CombiningThree Color Model Algorithms
Abstract: Human face recognition systems have gained a considerable attention during last decade due to itsvast applications in the field of computer and advantages over previous biometric methods. There are manyap...
Cloud Computing: Demand and Supply in Banking, Healthcare and Agriculture
Abstract: Right from the Stone Age one law is governing the market for every generation and that well acknowledged law is “Law of Demand & Supply”. ICT is not far away from this law. It is a well-known fact t...