Proceedings ArticleDOI
S3TFPAS: Scalable shoulder surfing resistant textual-formula base password authentication system
Muhammad Shakir,Abdul Ayaz Khan +1 more
- Vol. 8, pp 12-14
TLDR
It is argued that S3TFPAS will allow more secure and complex authentication with a lower cognitive load and provide a strong resistant against shoulder surfing, brute force attack, hidden cam and dictionary attack through dynamic password.Abstract:
The most common computer authentication method is to use alpha numeric user name and password. This method has been shown to have significant drawbacks. User tends to pick short password that can be easily guessed. On the other hand, if password is hard to guess, then it is often hard to remember. The vulnerabilities of textual password are well known. Users tend to pick short password or password that is easy to remember which makes password vulnerable for attackers to break. In this paper, we propose a scalable shoulder surfing resistant textual-formula base password authentication system (S3TFPAS). S3TFPAS seamlessly integrates the textual password and formula to create the strong random password. We argue that S3TFPAS will allow more secure and complex authentication with a lower cognitive load. It will provide a strong resistant against shoulder surfing, brute force attack, hidden cam and dictionary attack through dynamic password.read more
Citations
More filters
Patent
Multiple authentication mechanisms for accessing service center supporting a variety of products
TL;DR: In this article, a service center receives first media data from a mobile device over a network, including at least one of an image and a voice stream presenting an identity of a user associated with the mobile device.
Patent
User authentication system, and method
TL;DR: An object of the present invention is to provide a matrix authentication system that reduces the risk of password leakage.
Proceedings ArticleDOI
Do you think your passwords are secure
TL;DR: This paper analyzes the key derivation functions of popular Android Password-Managers with often startling results and aims to raise the awareness of developers of security critical apps for security, and provide an overview about the current state of implementation security of security-critical applications.
Journal ArticleDOI
A Simple and Secure Reformation-Based Password Scheme
Mushtaq Ali,Amanullah Baloch,Abdul Waheed,Mahdi Zareei,Rimsha Manzoor,Hassam Sajid,Faisal Alanazi +6 more
TL;DR: In this paper, a reformation-based password scheme involving no mental computation and using no extra device is proposed, which works on the password characters' indices, which change dynamically after each login process.
Journal ArticleDOI
User biometric information-based secure method for smart devices
TL;DR: The potential security problems caused by simple and weak passwords are studied, drawbacks of some conventional works are discussed, and 3 creative schemes to increase the complexity and strength of passwords by applying the envisioned features are proposed.
References
More filters
Journal ArticleDOI
Recognition memory for words, sentences, and pictures
TL;DR: This article found that median Ss were able to recognize the old stimuli in 90, 88, or 98% of the test pairs, respectively, in a test set consisting of words, sentences, or pictures.
Journal ArticleDOI
Users are not the enemy
Anne Adams,Martina Angela Sasse +1 more
TL;DR: It is argued that to change this state of affairs, security departments need to communicate more with users, and adopt a usercentered design approach.
Proceedings ArticleDOI
Design and evaluation of a shoulder-surfing resistant graphical password scheme
TL;DR: The design and evaluation of a game-like graphical method of authentication that is resistant to shoulder-surfing is reported on, which shows that novice users were able to enter their graphical password accurately and to remember it over time.
PPP Challenge Handshake Authentication Protocol (CHAP)
TL;DR: This document defines a method for Authentication using PPP, which uses a random Challenge, with a cryptographically hashed Response which depends upon the Challenge and a secret key.
Proceedings ArticleDOI
Fourth-factor authentication: somebody you know
TL;DR: This paper explores the notion of vouching, that is, peer-level, human-intermediated authentication for access control, and explores its use in emergency authentication, when primary authenticators like passwords or hardware tokens become unavailable.
Related Papers (5)
The Shoulder Surfing Resistant Graphical Password Authentication Technique
Aakansha Gokhale,Vijaya Waghmare +1 more