2006 IEEE Symposium on Virtual Environments, Human-Computer Interfaces and Measurement Systems 2006
DOI: 10.1109/vecims.2006.250805
|View full text |Cite
|
Sign up to set email alerts
|

A Novel 3D Graphical Password Schema

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Year Published

2007
2007
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 35 publications
(10 citation statements)
references
References 2 publications
0
9
0
1
Order By: Relevance
“…Previous research on authentication in virtual environments on 2D devices has highlighted the value of 3D passwords as an alternative to common authentication mechanisms, with the assumption that they are highly secure whilst also being less prone to shoulder surfing attacks [3], [12], [29]. As 3D passwords are not yet widely accepted, we start with accepted methods, namely PINs and Patterns (Android Unlock Pattern).…”
Section: B Authentication Concepts In Other Environmentsmentioning
confidence: 99%
“…Previous research on authentication in virtual environments on 2D devices has highlighted the value of 3D passwords as an alternative to common authentication mechanisms, with the assumption that they are highly secure whilst also being less prone to shoulder surfing attacks [3], [12], [29]. As 3D passwords are not yet widely accepted, we start with accepted methods, namely PINs and Patterns (Android Unlock Pattern).…”
Section: B Authentication Concepts In Other Environmentsmentioning
confidence: 99%
“…Otentifikasi adalah sebuah proses pembentukan identitas seorang pengguna sehingga dapat diotorisasi berhak atau tidak mengakses sebuah sistem atau aplikasi. Proses otentifikasi bisa terdiri dari berbagai tipe tergantung dari tingkatan keamanan yang diterapkan [3].…”
Section: A Otentifikasiunclassified
“…In this paper, the reviewed graphical password schemes included are the S3PAS (Huanyu, 2007), Triangle Scheme (Sabrado, 2002), Intersection Scheme (Sabrado, 2002), Moveable Frame (Sabrado, 2002), YAGP (HaiChang, 2008), ColorLogin (HaiChang, 2009, RGGPW (Lin Phen-Lan, 2008), CTZ (Kumar V., 2009), Use Your Illusion (Eiji Hayashi, 2008), Association-based Graphical Password Scheme (Zhi Li, 2005), Blonder's Graphical Password Scheme (G. Blonder, 1996), PassPoint (S. Weidenbeck, 2005), Pass-Go (H. Tao, 2008), Passfaces (realuser.com), V-Go (Passlogix, 2007), Random Art (R. Dhamija, 2000), 3D (Alsulaiman F.A., 2006), Hasegawa et al Algorithm (Hasegawa, 2009), An Interaction and Secure User Authentication Scheme (Qibin Sun, 2008), User Authentication for Mobile Device through Image Selection Scheme (Sarwar M.I, 2008), SFR Password (http://www.sfr-software.de/cms/EN/pocketpc/sfr-password/index.html, 2009), Jansen et al Algorithm (W. Jansen, 2004), Recall-A-Story (Yves Maetx, 2009), Awase-E (Tetsuji Takada, 2008), Stroke-based Graphical Password Scheme (ZiranZheng, 2009), and DAS (Jermyn I., 1999).…”
Section: Existing Graphical Password Schemesmentioning
confidence: 99%