A Mustang Security User Authentication Scheme Based On Graphical Password
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
In all computer security contexts, User authentication is an essential thing. The most popular and simple type of user authentication method is to use the alphanumeric passwords. The reasons behind why we are using alphanumeric passwords are the simplicity in the case of use and implementation. Inorder to avoid the drawbacks has been shown by these type of passwords, graphical passwords can be used for the user authentication by the fact that, a person can memorize images more than characters. And Graphical passwords are difficult to break using the common attack methods such as brute force attacks, dictionary attacks and social engineering attacks. Still graphical passwords are not yet widely used more than alphanumeric passwords. So, the chances of vulnerabilities are not fully understood. In this paper, I propose a novel graphical method to tighten password security and to overcome one of the main drawbacks of existing graphical password authentication schemes which is secure, robust and efficient.
Authors and Affiliations
Linju PS, Dr. Prem Krishnan
Multiuser access control for online social networks: by using of multiparty access control
Now a day Online social networks (OSNs) have got an exponential growth and become a fame to millions of Internet users. These OSNs offer attractive ways and methods for social interactions and information sharing, Al...
Accurately Computing Aggregates Using Synopsis Diffusion Framework
The communication wounded resultant from node and transmission failures, which are frequent in WSNs, can unfavorably affect tree-based aggregation approaches. To address this dilemma, we can make use of multi-path ro...
Pseudo Random Number Generator Using Reseeding Module
In cryptography encoding, is the process of encrypting messages or knowledge in a way such that hackers cannot read it. In an encoding scheme the message or knowledge is encoded by using an encryption method, which t...
A Survey on Channel Estimation Techniques in OFDM System
Orthogonal Frequency Division Multiplexing (OFDM) breaks the carrier in to sub carriers which are orthogonal to one- another, and hence called as orthogonal frequency division multiplexing. It is an extension of conv...
Design Of Virtual Sense Technology For System Interface
A gesture-based human computer interaction can make computers and devices easier to use, such as by allowing people to control the application on windows by moving their hands through the air. Existing solutions have...