Asian Journal of Information Technology

Year: 2015
Volume: 14
Issue: 1
Page No. 1 - 10

Graphical Authentication Using Enhanced Hybrid Graphical Authentication System

Authors : M.D. Fatehah, Mohd Zalisham Jali, M.K. Wafa and Nor Badrul Anuar


Alia, M.A., A.A. Hnaif, H.K. Al-Anie and A.A. Tamimi, 2012. Graphical password based on standard shapes. Sci. Ser. Data Rep., 4: 71-79.

Besinger, D., 1998. Human memory and the graphical password. Passlogix White Paper, Passlogix Inc., pp: 2.

Biddle, R., S. Chiasson and P.C. Van Oorschot, 2012. Graphical passwords: Learning from the first twelve years. ACM Comput. Surv. (CSUR), Vol. 44. 10.1145/2333112.2333114

Bishop, M. and D.V. Klein, 1995. Improving system security via proactive password checking. Comput. Secur., 14: 233-249.
CrossRef  |  

Brostoff, S. and M.A. Sasse, 2000. Are Passfaces More Usable than Passwords? A Field Trial Investigation. In: People and Computers XIV-Usability or Else, McDonald, S., Y. Waern and G. Cockton (Eds.). Springer, London, UK., ISBN-13: 978-1-85233-318-8, pp: 405-424.

Carstens, D.S., P.R. McCauley-Bell, L.C. Malone and R.F. DeMara, 2004. Evaluation of the human impact of password authentication practices on information security. Inform. Sci.: Int. J. Emerg. Transdiscipline, 7: 67-85.
Direct Link  |  

Chiasson, S., P.C. van Oorschot and R. Biddle, 2007. Graphical Password Authentication Using Cued Click Points. In: Research in Computer Security, Biskup, J. and J. Lopez (Eds.). Springer, Berlin, Germany, pp: 359-374.

Clarke, N.L. and S.M. Furnell, 2007. Advanced user authentication for mobile devices. Comput. Secur., 26: 109-119.
CrossRef  |  

Dhamija, R. and A. Perrig, 2000. Deja Vu: A user study using images for authentication. Proceedings of the 9th USENIX Security Symposium, August 14-17, 2000, Denver, Colorado, USA., pp: 45-58.

Dunphy, P. and J. Yan, 2007. Do background images improve Draw a Secret graphical passwords? Proceedings of the 14th Conference on Computer and Communications Security, October 29-November 2, 2007, Alexandria, VA., USA., pp: 36-47.

Fulkar, A., S. Sawla, Z. Khan and S. Solanki, 2012. A study of graphical passwords and various graphical password authentication schemes. World Res. J. Hum. Comput. Interact., 1: 4-8.
Direct Link  |  

Golofit, K., 2007. Click passwords under investigation. Proceedings of the 12th European Symposium on Research in Computer Security, September 24-26, 2007, Dresden, Germany, pp: 343-358.

Jali, M.Z., 2011. A study of graphical alternatives for user authentication. Ph.D. Thesis, School of Computing and Mathematics, Plymouth University, UK.

Jali, M.Z., S. Furnell and P. Dowland, 2011. Quantifying the effect of graphical password guidelines for better security. In: Future Challenges in Security and Privacy for Academia and Industry, Camenisch, J. S. Fischer-Hubner, Y. Murayama, A. Portmann and C. Rieder (Eds.). Springer, Berlin, Germany, ISBN-13: 978-3-642-21423-3, pp: 80-91.

Jermyn, I., A.J. Mayer, F. Monrose, M.K. Reiter and A.D. Rubin, 1999. The design and analysis of graphical passwords. Proceedings of the 8th USENIX Security Symposium, August 23-26, 1999, Washington, DC., USA., pp: 1-15.

Khan, W.Z., Y. Xiang, M.Y. Aalsalem and Q. Arshad, 2011. A hybrid graphical password based system. Proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, October 24-26, 2011, Melbourne, Australia, pp: 153-164.

Klein, D.V., 1990. Foiling the cracker: A survey of and improvements to, password security. Proceedings of the 2nd USENIX Security Workshop, August 27-28, 1990, Portland, OR., USA., pp: 5-14.

Lin, D., P. Dunphy, P. Olivier and J. Yan, 2007. Graphical passwords and qualitative spatial relations. Proceedings of the 3rd Symposium on Usable Privacy and Security, July 18-20, 2007, Pittsburgh, PA., USA., pp: 161-162.

Lin, P.L., L.T. Weng and P.W. Huang, 2008. Graphical passwords using images with random tracks of geometric shapes. Proceedings of the Congress on Image and Signal Processing, Volume 3, May 27-30, 2008, Sanya, China, pp: 27-31.

Morris, R. and K. Thompson, 1979. Password security: A case history. Commun. ACM, 22: 594-597.
Direct Link  |  

Perlman, R.J. and S.R. Hanna, 2001. Methods and systems for establishing a shared secret using an authentication token. U.S. Patent No. US6173400 B1.

Potter, M.C., 1976. Short-term conceptual memory for pictures. J. Exp. Psychol.: Hum. Learn. Memory, 2: 509-522.
CrossRef  |  Direct Link  |  

Sawla, S., A. Fulkar, Z. Khan and S. Solanki, 2012. Graphical password authentication system in an implicit manner. Int. J. Cryptogr. Secur., 2: 27-31.

Seng, W.C., Y.K. Khuen and N.L. Shing, 2011. Enhanced graphical password by using dynamic block-style scheme. Proceedings of the International Conference on Information and Intelligent Computing, (ICIIC'11), Singapore, pp: 139-145.

Swathi, M. and M.J. Reddy, 2013. Authentication using persuasive cued click points. Int. J. Eng. Res. Technol., Vol. 2.

Tardo, J.J. and K. Alagappan, 1992. SPX: Global authentication using public key certificates. J. Comput. Secur., 1: 295-316.
CrossRef  |  

Thorpe, J. and P.C. Van Oorschot, 2004. Graphical dictionaries and the memorable space of graphical passwords. Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA., USA., pp: 135-150.

Towhidi, F. and M. Masrom, 2009. A survey on recognition based graphical user authentication algorithms. Int. J. Comput. Sci. Inform. Secur., 6: 119-127.

Tullis, T.S. and D.P. Tedesco, 2005. Using personal photos as pictorial passwords. Proceedings of the Extended Abstracts on Human Factors in Computing Systems, April 2-7, 2005, Portland, OR., USA., pp: 1841-1844.

Van Oorschot, P.C. and J. Thorpe, 2011. Exploiting predictability in click-based graphical passwords. J. Comput. Secur., 19: 669-702.
CrossRef  |  

Wiedenbeck, S., J. Waters, J.C. Birget, A. Brodskiy and N. Memon, 2005. PassPoints: Design and longitudinal evaluation of a graphical password system. Int. J. Hum. Comput. Stud., 63: 102-127.
CrossRef  |  Direct Link  |  

Zheng, Z., X. Liu, L. Yin and Z. Liu, 2010. A hybrid password authentication scheme based on shape and text. J. Comput., 5: 765-772.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved