PassPattern system (PPS): a pattern-based user authentication scheme
T. Rakesh Kumar,S. V. Raghavan +1 more
- pp 162-169
TLDR
A dynamic password scheme based on patterns, called PassPattern System (PPS), which works using the existing infrastructure and is an Adaptive Authentication System, where the strength of the system can be changed depending on the need of the application without compromising the user comfort.Abstract:
Authenticating a user online, without compromising the user comfort is an important issue. The most popular approach to authenticate a user online is Password-based authentication. Studies show that, users (always) choose very simple passwords which are often easy to guess. On the contrary, randomly generated strings are difficult to remember, especially if the user is having many passwords. In this paper we present a dynamic password scheme based on patterns, called PassPattern System (PPS), which works using the existing infrastructure. PPS is an Adaptive Authentication System, where the strength of the system can be changed depending on the need of the application without compromising the user comfort.read more
Citations
More filters
Patent
Methods and devices for pattern-based user authentication
TL;DR: In this article, the authentication server may provide at least one image to the user, wherein the image may comprise a matrix of cells, and the user may choose a sequence of cells in the matrix as his or her secret.
Journal ArticleDOI
On the security of SSL/TLS-enabled applications
Manik Lal Das,Navkar Samdaria +1 more
TL;DR: This paper provides an effective solution which can resist the MITM attack on SSL/TLS-enabled applications, and uses a soft-token based approach for user authentication on top of the SSL/ TLS’s security features.
Journal ArticleDOI
A Survey of Authentication Schemes in Telecare Medicine Information Systems
Muhammad Umair Aslam,Abdelouahid Derhab,Kashif Saleem,Haider Abbas,Mehmet A. Orgun,Waseem Iqbal,Baber Aslam +6 more
TL;DR: These proposed authentication protocols are reviewed and their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost are discussed.
Patent
Apparatus and methods for obtaining a password hint
Göran Selander,Mats Näslund +1 more
TL;DR: In this article, a method and apparatus for obtaining a password hint is disclosed, which includes receiving a spatial pattern from a user, obtaining a passwords comprising a plurality of characters, and obtaining a hint consisting of an arrangement of characters.
Patent
Authentication method of field contents based challenge and enumerated pattern of field positions based response in random partial digitized path recognition system
Edward M. Barton,Len L. Mizrah +1 more
TL;DR: In this paper, an interactive method for authentication is based on a shared secret which is in the form of an enumerated pattern of fields on a frame of reference, in which the characters are arranged in a random or other irregular pattern on a grid of content fields.
References
More filters
Journal ArticleDOI
Recognition memory for words, sentences, and pictures
TL;DR: This article found that median Ss were able to recognize the old stimuli in 90, 88, or 98% of the test pairs, respectively, in a test set consisting of words, sentences, or pictures.
Journal ArticleDOI
Users are not the enemy
Anne Adams,Martina Angela Sasse +1 more
TL;DR: It is argued that to change this state of affairs, security departments need to communicate more with users, and adopt a usercentered design approach.
Proceedings ArticleDOI
Graphical passwords: a survey
Xiaoyuan Suo,Ying Zhu,G.S. Owen +2 more
TL;DR: This survey tries to answer two important questions: "Are graphical passwords as secure as text-based passwords?" and "What are the major design and implementation issues for graphical passwords?"
Proceedings ArticleDOI
Fourth-factor authentication: somebody you know
TL;DR: This paper explores the notion of vouching, that is, peer-level, human-intermediated authentication for access control, and explores its use in emergency authentication, when primary authenticators like passwords or hardware tokens become unavailable.
Book
One Thousand and One Arabian Nights
TL;DR: A completely new version of the Arabian Nights: many of the stories are told here for the first time in a collection for children, and they include fables, romances, jokes, and fairy tales.