Graphical user authentication: A time interval based approach
A number of authentication techniques have been proposed in the recent times that are based upon graphical methods. Text based passwords are most commonly used for authentication, however, they are highly vulnerable to several kinds of attacks. Graphical techniques are coming up as an attractive alt...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Umar, Mohammad Sarosh Rafiq, M. Q. Ansari, J. A. |
description | A number of authentication techniques have been proposed in the recent times that are based upon graphical methods. Text based passwords are most commonly used for authentication, however, they are highly vulnerable to several kinds of attacks. Graphical techniques are coming up as an attractive alternative to the conventional methods of authentication. In this paper we have proposed a graphical method of authentication that employs graphical coordinates along with a novel introduction of time interval between successive clicks. The user needs to recall the coordinates and the time interval of the successive clicks. This leads to the incorporation of the advantages of the recent graphical methods along with the added security achieved through the use of time interval. The proposed scheme has a much higher password space than the other contemporary graphical authentication schemes. The scheme is robust, secure and very convenient to use. |
doi_str_mv | 10.1109/ISPCC.2012.6224343 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6224343</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6224343</ieee_id><sourcerecordid>6224343</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-29bdf1b43b111d56c28c8f70e0783ffbeb45eafc52df7096e2feccdb22fd3a793</originalsourceid><addsrcrecordid>eNo1j99KwzAYxSMiqLMvoDd5gdZ8Sdskghej6BwMFNz9yJ8vNLJ1Jc0E396C89wczo_DgUPIPbAKgOnH9edH11WcAa9azmtRiwtSaKmgbqUAAaq9JLf_QYprUkzTF5slZQOK3ZDnVTJjH53Z09OEiZpT7nHIM8jxODzRJc3xgDQOGdP3XLJmQk_NOKajcf0duQpmP2Fx9gXZvr5su7dy875ad8tNGTXLJdfWB7C1sADgm9Zx5VSQDJlUIgSLtm7QBNdwP1PdIg_onLecBy-M1GJBHv5mIyLuxhQPJv3szofFL_k0Sn8</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Graphical user authentication: A time interval based approach</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Umar, Mohammad Sarosh ; Rafiq, M. Q. ; Ansari, J. A.</creator><creatorcontrib>Umar, Mohammad Sarosh ; Rafiq, M. Q. ; Ansari, J. A.</creatorcontrib><description>A number of authentication techniques have been proposed in the recent times that are based upon graphical methods. Text based passwords are most commonly used for authentication, however, they are highly vulnerable to several kinds of attacks. Graphical techniques are coming up as an attractive alternative to the conventional methods of authentication. In this paper we have proposed a graphical method of authentication that employs graphical coordinates along with a novel introduction of time interval between successive clicks. The user needs to recall the coordinates and the time interval of the successive clicks. This leads to the incorporation of the advantages of the recent graphical methods along with the added security achieved through the use of time interval. The proposed scheme has a much higher password space than the other contemporary graphical authentication schemes. The scheme is robust, secure and very convenient to use.</description><identifier>ISBN: 1467313173</identifier><identifier>ISBN: 9781467313179</identifier><identifier>EISBN: 9781467313186</identifier><identifier>EISBN: 1467313165</identifier><identifier>EISBN: 1467313181</identifier><identifier>EISBN: 9781467313162</identifier><identifier>DOI: 10.1109/ISPCC.2012.6224343</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Computers ; Dictionaries ; Electronic mail ; Force ; Graphical Passwords ; Security ; Servers</subject><ispartof>2012 IEEE International Conference on Signal Processing, Computing and Control, 2012, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6224343$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6224343$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Umar, Mohammad Sarosh</creatorcontrib><creatorcontrib>Rafiq, M. Q.</creatorcontrib><creatorcontrib>Ansari, J. A.</creatorcontrib><title>Graphical user authentication: A time interval based approach</title><title>2012 IEEE International Conference on Signal Processing, Computing and Control</title><addtitle>ISPCC</addtitle><description>A number of authentication techniques have been proposed in the recent times that are based upon graphical methods. Text based passwords are most commonly used for authentication, however, they are highly vulnerable to several kinds of attacks. Graphical techniques are coming up as an attractive alternative to the conventional methods of authentication. In this paper we have proposed a graphical method of authentication that employs graphical coordinates along with a novel introduction of time interval between successive clicks. The user needs to recall the coordinates and the time interval of the successive clicks. This leads to the incorporation of the advantages of the recent graphical methods along with the added security achieved through the use of time interval. The proposed scheme has a much higher password space than the other contemporary graphical authentication schemes. The scheme is robust, secure and very convenient to use.</description><subject>Authentication</subject><subject>Computers</subject><subject>Dictionaries</subject><subject>Electronic mail</subject><subject>Force</subject><subject>Graphical Passwords</subject><subject>Security</subject><subject>Servers</subject><isbn>1467313173</isbn><isbn>9781467313179</isbn><isbn>9781467313186</isbn><isbn>1467313165</isbn><isbn>1467313181</isbn><isbn>9781467313162</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1j99KwzAYxSMiqLMvoDd5gdZ8Sdskghej6BwMFNz9yJ8vNLJ1Jc0E396C89wczo_DgUPIPbAKgOnH9edH11WcAa9azmtRiwtSaKmgbqUAAaq9JLf_QYprUkzTF5slZQOK3ZDnVTJjH53Z09OEiZpT7nHIM8jxODzRJc3xgDQOGdP3XLJmQk_NOKajcf0duQpmP2Fx9gXZvr5su7dy875ad8tNGTXLJdfWB7C1sADgm9Zx5VSQDJlUIgSLtm7QBNdwP1PdIg_onLecBy-M1GJBHv5mIyLuxhQPJv3szofFL_k0Sn8</recordid><startdate>201203</startdate><enddate>201203</enddate><creator>Umar, Mohammad Sarosh</creator><creator>Rafiq, M. Q.</creator><creator>Ansari, J. A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201203</creationdate><title>Graphical user authentication: A time interval based approach</title><author>Umar, Mohammad Sarosh ; Rafiq, M. Q. ; Ansari, J. A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-29bdf1b43b111d56c28c8f70e0783ffbeb45eafc52df7096e2feccdb22fd3a793</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Authentication</topic><topic>Computers</topic><topic>Dictionaries</topic><topic>Electronic mail</topic><topic>Force</topic><topic>Graphical Passwords</topic><topic>Security</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Umar, Mohammad Sarosh</creatorcontrib><creatorcontrib>Rafiq, M. Q.</creatorcontrib><creatorcontrib>Ansari, J. A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Umar, Mohammad Sarosh</au><au>Rafiq, M. Q.</au><au>Ansari, J. A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Graphical user authentication: A time interval based approach</atitle><btitle>2012 IEEE International Conference on Signal Processing, Computing and Control</btitle><stitle>ISPCC</stitle><date>2012-03</date><risdate>2012</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><isbn>1467313173</isbn><isbn>9781467313179</isbn><eisbn>9781467313186</eisbn><eisbn>1467313165</eisbn><eisbn>1467313181</eisbn><eisbn>9781467313162</eisbn><abstract>A number of authentication techniques have been proposed in the recent times that are based upon graphical methods. Text based passwords are most commonly used for authentication, however, they are highly vulnerable to several kinds of attacks. Graphical techniques are coming up as an attractive alternative to the conventional methods of authentication. In this paper we have proposed a graphical method of authentication that employs graphical coordinates along with a novel introduction of time interval between successive clicks. The user needs to recall the coordinates and the time interval of the successive clicks. This leads to the incorporation of the advantages of the recent graphical methods along with the added security achieved through the use of time interval. The proposed scheme has a much higher password space than the other contemporary graphical authentication schemes. The scheme is robust, secure and very convenient to use.</abstract><pub>IEEE</pub><doi>10.1109/ISPCC.2012.6224343</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1467313173 |
ispartof | 2012 IEEE International Conference on Signal Processing, Computing and Control, 2012, p.1-6 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6224343 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Computers Dictionaries Electronic mail Force Graphical Passwords Security Servers |
title | Graphical user authentication: A time interval based approach |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T01%3A48%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Graphical%20user%20authentication:%20A%20time%20interval%20based%20approach&rft.btitle=2012%20IEEE%20International%20Conference%20on%20Signal%20Processing,%20Computing%20and%20Control&rft.au=Umar,%20Mohammad%20Sarosh&rft.date=2012-03&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.isbn=1467313173&rft.isbn_list=9781467313179&rft_id=info:doi/10.1109/ISPCC.2012.6224343&rft_dat=%3Cieee_6IE%3E6224343%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467313186&rft.eisbn_list=1467313165&rft.eisbn_list=1467313181&rft.eisbn_list=9781467313162&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6224343&rfr_iscdi=true |