Dynamic Passwords Using Graphics
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract:Textual passwords are most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable toshoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.
Authors and Affiliations
Abhinav Sharma, Rupali PaunikarRoni Raj Das, Prerak Sola
Object Detection by Estimation of the Spectral Attenuation Coefficient in the Submerged Medium
Abstract:Underwater object detection has a considerable impact in the field of ocean technology. This paper presents a techniqueto detect a submerged object based on the medium’s spectral attenuation coefficient by...
A Survey and Study of Image Compression Methods
Abstract: This paper focuses on the area of Image Compression which is used in various Image Processing Applications. This paper presents a survey and study of various image compression techniques primarily, The Pr...
Monitoring Selfish Nodes in MANET during Replica Allocation
Abstract: Mobile Ad Hoc Network is a collection of mobile hosts. The mobility nature of the MANET causes the mobile host to move freely in the network, due to that network disconnections occurs frequently and this...
Enabling Lazy Learning for Uncertain Data Streams
Abstract: Lazy learning concept is performing the k-nearest neighbor algorithm, Is used to classification andsimilarly to clustering of k-nearest neighbor algorithm both are based on Euclidean distance based algori...
Filter Based addressing protocol for effective Node Auto configuration in Ad hoc Network
MANET is used for many distributed network, the lack of a centralized administration makes these networks attractive for several distributed applications, such as sensing, Internet access to deprived communities, and dis...