Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches a...
Saved in:
| Main Authors: | Peng Foong Ho, Yvonne Hwei-Syn Kam, Mee Chin Wee, Yu Nam Chong, Lip Yee Por |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2014-01-01
|
| Series: | The Scientific World Journal |
| Online Access: | http://dx.doi.org/10.1155/2014/838623 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment
by: Zhili Zhou, et al.
Published: (2019-01-01) -
Shoulder-surfing resistant PIN-entry method
by: Shudi CHEN, et al.
Published: (2019-02-01) -
Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks
by: Junghyun Nam, et al.
Published: (2014-01-01) -
Applying Combined One-Time Passwords to Prevent Phishing Attacks in Electronic Banking
by: Yufeng Qian
Published: (2024-12-01) -
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
by: Nada Abdul Aziz Mustafa
Published: (2024-04-01)