User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 12
 Downloands 1
Security Analysis of the Graphical Password-Based Authentication Systems with Different Attack Proofs
2023
Journal:  
International Journal of Intelligent Systems and Applications in Engineering
Author:  
Abstract:

Abstract Graphical password authentication is an effective alternative to the textual based password as the text based passwords are difficult to be remembered. One of the disadvantage is that there are several attacks existing in these schemes that disrupts the integrity of the websites. In this paper, a detailed security analysis for various kinds of attacks existing in a graphical password authentication system is presented. Initially, the scenario of graphical authentication system along with its types are narrated. Then, the major security threats encountered in the graphical password authentication systems till date are explored. Based on the security threats arising in the authentication systems, the zero knowledge attack proof is formulated and the analysis is explained. More importance is given to the shoulder surfing attack and the proof is explained with the help of an application scenario. The introduced application scenario includes a 3D graphical password authentication system for website login. The scenario is proved to be shoulder surfing resistance using the zero knowledge proof protocol. With the analysis, it is proved that the graphical passwords are highly significant in maintaining the integrity of the websites.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles












International Journal of Intelligent Systems and Applications in Engineering

Field :   Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 1.632
Cite : 489
2023 Impact : 0.054
International Journal of Intelligent Systems and Applications in Engineering