2017 8th International Conference on Information Technology (ICIT) 2017
DOI: 10.1109/icitech.2017.8080034
|View full text |Cite
|
Sign up to set email alerts
|

A more secure scheme for CAPTCHA-based authentication in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Recently, Althamary el al. [20] proposed a CAPTCHA based authentication method in cloud environments to strengthen weak passwords against different attacks including short-password attack, dictionary attack, keyloggers, phishing and social engineering. However, the CAPTCHA schemes used in these authentication methods are similar to existing commercial text-based CAPTCHAs and all of them have been broken with high percentages of accuracy, e.g., [6,21,22,23] and [24].…”
Section: Captcha Strengthened Authentication and Its Alternativesmentioning
confidence: 99%
“…Recently, Althamary el al. [20] proposed a CAPTCHA based authentication method in cloud environments to strengthen weak passwords against different attacks including short-password attack, dictionary attack, keyloggers, phishing and social engineering. However, the CAPTCHA schemes used in these authentication methods are similar to existing commercial text-based CAPTCHAs and all of them have been broken with high percentages of accuracy, e.g., [6,21,22,23] and [24].…”
Section: Captcha Strengthened Authentication and Its Alternativesmentioning
confidence: 99%
“…Ibrahim A. Althamary et al [6] proposed a well-known authentication scheme called "A More Secure Scheme for CAPTCHA-Based Authentication in Cloud Environment." This authentication mechanism combines the user's password with modified characters of CAPTCHA that a secret agreement between the cloud service provider and the user.…”
Section: Related Workmentioning
confidence: 99%
“…This method is designed based on 3-dimensional sensors such as the accelerometer, the orientation, the magnetometer, the gravity sensors, and the gyroscope. Tap Logger [13], a Trojan application collects the data through an accelerometer (detect the number of taps) and orientation sensors (find position of the taps). This detected data are enough to log the screen on, detect credit card numbers and PIN numbers.…”
Section: Literature Reviewmentioning
confidence: 99%