Cargando…

Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information

Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches a...

Descripción completa

Detalles Bibliográficos
Autores principales: Ho, Peng Foong, Kam, Yvonne Hwei-Syn, Wee, Mee Chin, Chong, Yu Nam, Por, Lip Yee
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058474/
https://www.ncbi.nlm.nih.gov/pubmed/24991649
http://dx.doi.org/10.1155/2014/838623

Ejemplares similares