scispace - formally typeset
Proceedings ArticleDOI

S3TFPAS: Scalable shoulder surfing resistant textual-formula base password authentication system

TLDR
It is argued that S3TFPAS will allow more secure and complex authentication with a lower cognitive load and provide a strong resistant against shoulder surfing, brute force attack, hidden cam and dictionary attack through dynamic password.
Abstract
The most common computer authentication method is to use alpha numeric user name and password. This method has been shown to have significant drawbacks. User tends to pick short password that can be easily guessed. On the other hand, if password is hard to guess, then it is often hard to remember. The vulnerabilities of textual password are well known. Users tend to pick short password or password that is easy to remember which makes password vulnerable for attackers to break. In this paper, we propose a scalable shoulder surfing resistant textual-formula base password authentication system (S3TFPAS). S3TFPAS seamlessly integrates the textual password and formula to create the strong random password. We argue that S3TFPAS will allow more secure and complex authentication with a lower cognitive load. It will provide a strong resistant against shoulder surfing, brute force attack, hidden cam and dictionary attack through dynamic password.

read more

Citations
More filters
Patent

Multiple authentication mechanisms for accessing service center supporting a variety of products

TL;DR: In this article, a service center receives first media data from a mobile device over a network, including at least one of an image and a voice stream presenting an identity of a user associated with the mobile device.
Patent

User authentication system, and method

TL;DR: An object of the present invention is to provide a matrix authentication system that reduces the risk of password leakage.
Proceedings ArticleDOI

Do you think your passwords are secure

TL;DR: This paper analyzes the key derivation functions of popular Android Password-Managers with often startling results and aims to raise the awareness of developers of security critical apps for security, and provide an overview about the current state of implementation security of security-critical applications.
Journal ArticleDOI

A Simple and Secure Reformation-Based Password Scheme

TL;DR: In this paper, a reformation-based password scheme involving no mental computation and using no extra device is proposed, which works on the password characters' indices, which change dynamically after each login process.
Journal ArticleDOI

User biometric information-based secure method for smart devices

TL;DR: The potential security problems caused by simple and weak passwords are studied, drawbacks of some conventional works are discussed, and 3 creative schemes to increase the complexity and strength of passwords by applying the envisioned features are proposed.
References
More filters
Journal ArticleDOI

Recognition memory for words, sentences, and pictures

TL;DR: This article found that median Ss were able to recognize the old stimuli in 90, 88, or 98% of the test pairs, respectively, in a test set consisting of words, sentences, or pictures.
Journal ArticleDOI

Users are not the enemy

TL;DR: It is argued that to change this state of affairs, security departments need to communicate more with users, and adopt a usercentered design approach.
Proceedings ArticleDOI

Design and evaluation of a shoulder-surfing resistant graphical password scheme

TL;DR: The design and evaluation of a game-like graphical method of authentication that is resistant to shoulder-surfing is reported on, which shows that novice users were able to enter their graphical password accurately and to remember it over time.

PPP Challenge Handshake Authentication Protocol (CHAP)

W. Simpson
TL;DR: This document defines a method for Authentication using PPP, which uses a random Challenge, with a cryptographically hashed Response which depends upon the Challenge and a secret key.
Proceedings ArticleDOI

Fourth-factor authentication: somebody you know

TL;DR: This paper explores the notion of vouching, that is, peer-level, human-intermediated authentication for access control, and explores its use in emergency authentication, when primary authenticators like passwords or hardware tokens become unavailable.
Related Papers (5)