Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information

Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches a...

Full description

Saved in:
Bibliographic Details
Main Authors: Peng Foong Ho, Yvonne Hwei-Syn Kam, Mee Chin Wee, Yu Nam Chong, Lip Yee Por
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/838623
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items