2022
DOI: 10.18280/ijsse.120103
|View full text |Cite
|
Sign up to set email alerts
|

Passnumbers: An Approach of Graphical Password Authentication Based on Grid Selection

Abstract: The authentication textual passwords are the most widely used technique. However, this type of legacy authentication is vulnerable to various attacks, such as shoulder-surfing attacks. Hence, graphical password authentication is one of these approaches which has been suggested to overcome the issues related to textual passwords. Nevertheless, the hackers have also developed new techniques that can be finally broken the graphical password, for instance, listening to the transmitted information between the clien… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…The EFT is shown with [18]: 𝐸𝐹𝑇(𝑛 𝑖 , 𝑝 𝑖 ) = 𝑀 𝑖,𝑗 + 𝐸𝑆𝑇(𝑛 𝑖 , 𝑝 𝑖 ) (5) where the EFT of job vi on processor pj is formed by adding the ESTs and computational costs of task I on processor j. With Eq, the task's AFT may be determined (6). Actual completion time is given by [18]:…”
Section: Earliest Finish Time and Actual Finish Timementioning
confidence: 99%
See 1 more Smart Citation
“…The EFT is shown with [18]: 𝐸𝐹𝑇(𝑛 𝑖 , 𝑝 𝑖 ) = 𝑀 𝑖,𝑗 + 𝐸𝑆𝑇(𝑛 𝑖 , 𝑝 𝑖 ) (5) where the EFT of job vi on processor pj is formed by adding the ESTs and computational costs of task I on processor j. With Eq, the task's AFT may be determined (6). Actual completion time is given by [18]:…”
Section: Earliest Finish Time and Actual Finish Timementioning
confidence: 99%
“…The firm does not have to spend money on this because cloud computing is constantly updated. Cloud computing can help businesses save money [4]- [6]. The cloud model is ideal for this purpose.…”
Section: Introductionmentioning
confidence: 99%
“…Key spacing is defined as the number of distinct secret keys it can generate. The cipher is secure if the key spacing is at least 2100 [21]. The proposed algorithm uses an image that acts as a key to encode the message based on its dimensions, so the key size is 2 π‘Ÿ * 𝑐 * 3 , The dimensions of the row (r) and column (c) will be variable according to the size of the image used for encryption, and this gives the algorithm the power to counteract a brute force attack.…”
Section: Brute Force Attackmentioning
confidence: 99%
“…Graphical passwords have been categorized into four main schemes: drawmetric (pure-recall-based), locimetric (cued-recall-based), cognometric (recognition-based), and hybrid [72]. In general, graphical password systems have various usability and security advantages such as being easy to remember and difficult to guess, higher security level, being human-friendly, and mitigating dictionary attacks; however, they are vulnerable to shoulder-surfing attacks and brute-force attacks (which reduce the common areas in the images) [73].…”
Section: B Graphical Passwordsmentioning
confidence: 99%