A More Secure Position Based Graphical Password Authentication
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: We are proposing a new pass-point graphical password authentication by using a simple virtual environment. Our virtual environment is influenced by a social networking site’ s game. In this system, user interacts with the virtual environment and user can generate sequence of interactions according to his /her choice which will gather by a background process. This process decides whether the user is authenticated user or a not, depending on which the system allows or denies accessing the resources. There are many existing authentication schemes are based on a simple pas-point mechanism, most of them are unsuccessful due to the shoulder surfing attacks. The proposed scheme seems sometime similar to the pass-point techniques but it is very much different with respect to the authentication process.
Authors and Affiliations
Mohd. Aqil Khan , YDS Arya , Gaurav Agarwal
Effects of Social Networking by Influencers [Beware and Stay Safe]
Abstract: A short time agone, social spam and on-line abuse were much non-existent. As email spam filters became simpler, catching over ninety fifth of those messages, spammers have moved to a replacement target –...
A Word Stemming Algorithm for Hausa Language
Abstract: Hausa, a highly inflected language, needs a worthy stemming approach for efficient informationretrieval (IR). However, there is a limited or unavailable study to stemming in the language. Stemming refers tothe...
Artificial Intelligence in Robot Path Planning
Abstract: Mobile robot path planning problem is an important combinational content of artificial intelligence and robotics. Its mission is to be independently movement from the starting point to the target point make ro...
Cloud Computing: Environment of Next Generation Technology
Abstract: Cloud computing is the convergence of virtualization, Distributed Applications, Grid, Maturity of enterprise software application and enterprise IT Management. It is a tremendously attractive technology a...
An Efficient And Secure Cryptography Techniques Usingunimodular Matrix
Abstract: In day to day life, transmission of data from sender to receiver with security is very difficult. "Cryptography" is one of the famous techniques which provide security for confidential data. Cryptography is one...