2011
DOI: 10.5121/acij.2011.2404
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach For Authenticating Textual Or Graphical Passwords Using Hopfield Neural Network

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Password authentication is a common approach to the system security and it is also a very important procedure to gain access to user resources. In the conventional password authentication methods a server has to authenticate the legitimate user [1].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Password authentication is a common approach to the system security and it is also a very important procedure to gain access to user resources. In the conventional password authentication methods a server has to authenticate the legitimate user [1].…”
Section: Introductionmentioning
confidence: 99%
“…Our preliminary analysis suggests that it is more difficult to break graphical passwords using the traditional attack methods such as brute force search, dictionary attack, or spyware. However, since there is not yet wide deployment of graphical password systems, the vulnerabilities of graphical passwords are still not fully understood [1]. Graphical password schemes have been proposed as a possible alternative to text-based schemes, motivated partially by the fact that humans can remember pictures better than text; psychological studies supports such assumption .…”
Section: Introductionmentioning
confidence: 99%
“…Even if the information is stored in the hashed format [9] or encrypted format the intruder can affect the system like appending the wrong password for an identified user etc. hence to overcome this setback we use soft computing approach, a neural network with Back Propagation Learning [12]. In this work we explained different password mechanisms and different stages of password enhancements, drawbacks of each mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…In our scheme users are allowed to give a username and password at the registration phase without any password policies, we developed a Feed Forward Neural Network which takes the user name as an input and produces user password which was given at the registration as output [12]. We employed Back propagation [13] a supervised learning algorithm s. The weights of the neural network are stored at the sever side DB [4,12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation