Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 7
Page No. 1738 - 1745

Robust Authentication Approach Based on Keyboard Graphical Password

Authors : Mehdi Ebady Manaa and Marwa K. Al-Rikaby

References

Anjitha, K. and I.K. Rijin, 2015. Captcha as graphical passwords-enhanced with video-based captcha for secure services. Proceedings of the 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), October 29-31, 2015, IEEE, Kannur, India, ISBN:978-1-4673-9223-5, pp: 213-217.

Bhand, A., V. Desale, S. Shirke and S.P. Shirke, 2015. Enhancement of password authentication system using graphical images. Proceedings of the International Conference on Information Processing (ICIP), December 16-19, 2015, IEEE, Mumbai, India, ISBN:978-1-4673-7758-4, pp: 217-219.

Bhanushali, A., B. Mange, H. Vyas, H. Bhanushali and P. Bhogle, 2015. Comparison of graphical password authentication techniques. Int. J. Comput. Appl., 116: 11-11.
Direct Link  |  

Bhaya, W. and M.E. Manaa, 2014. Review clustering mechanisms of distributed denial of service attacks. J. Comput. Sci., 10: 2037-2046.

Bianchi, A., I. Oakley and H. Kim, 2016. PassBYOP: Bring your own picture for securing graphical passwords. IEEE. Trans. Hum. Mach. Syst., 46: 380-389.
CrossRef  |  Direct Link  |  

Borkar, V.S. and P.C. Golar, 2015. Click based graphical passward with text password authentication. Int. J. Comput. Sci. Network Secur. (IJCSNS.), 15: 76-79.
Direct Link  |  

Gokhale, A.S. and V.S. Waghmare, 2016. The shoulder surfing resistant graphical password authentication technique. Procedia Comput. Sci., 79: 875-884.
CrossRef  |  Direct Link  |  

Haque, M.A., N.Z. Khan and G. Khatoon, 2015. Authentication through keystrokes: What you type and how you type. Proceedings of the 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN.), November 20-22, 2015, IEEE, Aligarh, India, ISBN:978-1-4673-6735-6, pp: 257-261.

Jog, P.P. and A.B. Patankar, 2016. Graphical password authentication using a fake cursor approach. Int. J. Comput. Appl., 148: 35-40.
Direct Link  |  

Kayem, A.V., 2016. Graphical passwords a discussion. Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), March 23-25, 2016, IEEE, Cape Town, South Africa, ISBN:978-1-5090-2461-2, pp: 596-600.

Khan, W.Z., M.Y. Aalsalem and Y. Xiang, 2011. A graphical password based system for small mobile devices. Int. J. Comput. Sci., 8: 145-154.
Direct Link  |  

Kolekar, V.K. and M.B. Vaidya, 2015. Click and session based captcha as graphical password authentication schemes for smart phone and web. Proceedings of the 2015 International Conference on Information Processing (ICIP), December 16-19, 2015, IEEE, Maharashtra, India, ISBN:978-1-4673-7758-4, pp: 669-674.

Kumar, M., T. Garfinkel, D. Boneh and T. Winograd, 2007. Reducing shoulder-surfing by using gaze-based password entry. Proceedings of the Symposium on Usable Privacy and Security (SOUPS), July 18-20, Pittsburgh, USA., pp: 1-7.

Lee, J.W., S.S. Choi and B.R. Moon, 2007. An evolutionary keystroke authentication based on ellipsoidal hypothesis space. Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, July 7-11, 2007, ACM, London, England, ISBN:978-1-59593-697-4, pp: 2090-2097.

Mathew, G. and S. Thomas, 2013. A novel multifactor authentication system ensuring usability and security. Preprint, 2: 21-30.
Direct Link  |  

Monrose, F. and A. Rubin, 1997. Authentication via keystroke dynamics. Proceedings of the 4th ACM Conference on Computer and Communications Security, April 1-4, 1997, ACM, Zurich, Switzerland, ISBN:0-89791-912-2, pp: 48-56.

Mule, S.S., H.B. Mali, 2015. Review on biometric authentication methods. Int. J. Adv. Res. Comput. Commun. Eng., 4: 252-255.
Direct Link  |  

Narhar, U.K. and R.B. Joshi, 2015. Highly secure authentication scheme. Proceedings of the2015 International Conference on Computing Communication Control and Automation (ICCUBEA), February 26-27, 2015, IEEE, Pune, India, ISBN:978-1-4799-6892-3, pp: 270-274.

Oorschot, V.P.C. and T. Wan, 2009. TwoStep: An Authentication Method Combining Text and Graphical Passwords. In: E-Technologies: Innovation in an Open World, Gilbert, B., P. Kropf and M. Weiss (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-01186-3, pp: 233-239.

Pawar, T.S., R.G. Sawant, P.S. Bothe and S.A. Chopade, 2015. A survey on login authentication system using captcha as graphical password technquies. Int. J. Innovative Res. Comput. Commun. Eng., 3: 10131-10138.

Saeed, S. and M.S. Umar, 2015. A hybrid graphical user authentication scheme. Proceedings of the 2015 Conference on Communication Control and Intelligent Systems (CCIS), November 7-8, 2015, IEEE, Aligarh, India, ISBN:978-1-4673-7541-2, pp: 411-415.

Sahu, S.B., 2015. Secure user authentication and graphical password using cued click-points. Int. J. Comput. Technol., 18: 156-160.
Direct Link  |  

Shanmugapriya, D. and G. Padmavathi, 2009. A survey of biometric keystroke dynamics: Approaches, security and challenges. Int. J. Comput. Sci. Inf. Secur. (IJCSIS.), 5: 115-119.
Direct Link  |  

Shay, R., S. Komanduri, A.L. Durity, P.S. Huh and M.L. Mazurek et al., 2016. Designing password policies for strength and usability. ACM. Trans. Inf. Syst. Secur. (TISSEC.), 18: 1-34.
CrossRef  |  Direct Link  |  

Singh, N. and N. Bomanwar, 2015. Improved authentication scheme using password enabled persuasive cued click points. Proceedings of the International Conference on Green Computing and Internet of Things (ICGCIoT), October 8-10, 2015, IEEE, Mumbai, India, ISBN:978-1-4673-7910-6, pp: 1394-1398.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved