2014
DOI: 10.14445/22312803/ijctt-v18p137
|View full text |Cite
|
Sign up to set email alerts
|

Secure User Authentication & Graphical Password using Cued Click-Points

Abstract: Abstract:The major problem of user registration, mostly text base password, is well known. In the login user be inclined to select simple passwords which is frequently in mind that are straightforward for attackers to guess, difficult machine created password mostly complicated to user take in mind. User authenticate password using cued click points and Persuasive Cued Click Points graphical password scheme which includes usability and security evaluations. This paper includes the persuasion to secure user aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
(14 reference statements)
0
2
0
Order By: Relevance
“…Used tolerance region is 19 ϫ 19 pixels and view point of the image is 75 ϫ 75 pixels square. Sahu and Singh (2014b) describe the process of identifying an individual usually based on a username and password. Passwords are the best commonly used method for identifying users in computer and communication systems.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Used tolerance region is 19 ϫ 19 pixels and view point of the image is 75 ϫ 75 pixels square. Sahu and Singh (2014b) describe the process of identifying an individual usually based on a username and password. Passwords are the best commonly used method for identifying users in computer and communication systems.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The techniques used for detection of key loggers include application program interface (APIs). These are distinct APIs that monitor and detect the keyboard currently being used for the SPPCCP module (Sahu and Singh, 2014b). The APIs used are as follows:…”
Section: Detection Of Key Loggersmentioning
confidence: 99%