A graphical password scheme strongly resistant to spyware

被引:0
作者
Hong, DW [1 ]
Man, S [1 ]
Hawes, B [1 ]
Matthews, M [1 ]
机构
[1] Rutgers State Univ, Dept Comp Sci, Camden, NJ 08054 USA
来源
SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT | 2004年
关键词
graphical password; spyware resistant; computer security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spyware is now a serious threat to computer security. In particular, the Internet is used to remotely login to servers in which sensitive data and applications are stored. Spyware can steal passwords when users login to servers through the Internet We propose a new password scheme which is strongly resistant to spyware. In theory, a password in the scheme is a set of random strings. We programmed the scheme and conducted experiments. The result is promising.
引用
收藏
页码:94 / 100
页数:7
相关论文
共 50 条
  • [31] Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
    Cheong, Soon-Nyean
    Ling, Huo-Chong
    Teh, Pei-Lee
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (07) : 3561 - 3568
  • [32] Pixel Value Graphical Password Scheme: Analysis on Time Complexity performance of Clustering Algorithm for Passpix Segmentation
    Yunus, Mohd Sidek Fadhil Mohd
    Isa, Mohd Rizal Mohd
    Shukran, Mohd Afizi Mohd
    Wahab, Norshahriah
    Rahayu, Syarifah Bahiyah
    Fadzlah, Amalina Farhi Ahmad
    JOURNAL OF ENGINEERING AND TECHNOLOGICAL SCIENCES, 2023, 55 (01): : 52 - 59
  • [33] Sequential Graphical Password Framework for Mobile Devices
    Hui, Liew Tze
    Bashier, Housam Khalifa
    Hoe, Lau Siong
    Kwee, Wee Kouk
    Abdullah, Mohd Fikri Azli
    2014 4th World Congress on Information and Communication Technologies (WICT), 2014, : 194 - 198
  • [34] Token-based graphical password authentication
    Gyorffy, John Charles
    Tappenden, Andrew F.
    Miller, James
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (06) : 321 - 336
  • [35] A Systematic Literature Review of Graphical Password Schemes
    Shammee T.I.
    Akter T.
    Mou M.
    Chowdhury F.
    Ferdous M.S.
    Chowdhury, Farida (farida-cse@sust.edu), 1600, Korean Institute of Information Scientists and Engineers (16): : 163 - 185
  • [36] Token-based graphical password authentication
    John Charles Gyorffy
    Andrew F. Tappenden
    James Miller
    International Journal of Information Security, 2011, 10 : 321 - 336
  • [37] An Enhanced Drawing Reproduction Graphical Password Strategy
    Liu, Xi-Yang
    Gao, Hai-Chang
    Wang, Li-Ming
    Chang, Xiu-Ling
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (06) : 988 - 999
  • [38] An Enhanced Drawing Reproduction Graphical Password Strategy
    刘西洋
    高海昌
    王黎明
    常秀玲
    JournalofComputerScience&Technology, 2011, 26 (06) : 988 - 999
  • [39] Alignment based graphical password authentication system
    Danish, Abutalha
    Sharma, Labhya
    Varshney, Harshit
    Khan, Asad Mohammed
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2950 - 2954
  • [40] An Enhanced Drawing Reproduction Graphical Password Strategy
    Xi-Yang Liu
    Hai-Chang Gao
    Li-Ming Wang
    Xiu-Ling Chang
    Journal of Computer Science and Technology, 2011, 26 : 988 - 999