Cargando…
Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches a...
Autores principales: | Ho, Peng Foong, Kam, Yvonne Hwei-Syn, Wee, Mee Chin, Chong, Yu Nam, Por, Lip Yee |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058474/ https://www.ncbi.nlm.nih.gov/pubmed/24991649 http://dx.doi.org/10.1155/2014/838623 |
Ejemplares similares
-
Password
por: Eve, Martin Paul, et al.
Publicado: (2016) -
A Password Meter without Password Exposure
por: Kim, Pyung, et al.
Publicado: (2021) -
Recurrent GANs Password Cracker For IoT Password Security Enhancement †
por: Nam, Sungyup, et al.
Publicado: (2020) -
Take Control of Your Passwords
por: Kissell, Joe
Publicado: (2019) -
Take Control of 1Password
por: Kissell, Joe
Publicado: (2020)