Graphical user authentication: A time interval based approach

A number of authentication techniques have been proposed in the recent times that are based upon graphical methods. Text based passwords are most commonly used for authentication, however, they are highly vulnerable to several kinds of attacks. Graphical techniques are coming up as an attractive alt...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Umar, Mohammad Sarosh, Rafiq, M. Q., Ansari, J. A.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Umar, Mohammad Sarosh
Rafiq, M. Q.
Ansari, J. A.
description A number of authentication techniques have been proposed in the recent times that are based upon graphical methods. Text based passwords are most commonly used for authentication, however, they are highly vulnerable to several kinds of attacks. Graphical techniques are coming up as an attractive alternative to the conventional methods of authentication. In this paper we have proposed a graphical method of authentication that employs graphical coordinates along with a novel introduction of time interval between successive clicks. The user needs to recall the coordinates and the time interval of the successive clicks. This leads to the incorporation of the advantages of the recent graphical methods along with the added security achieved through the use of time interval. The proposed scheme has a much higher password space than the other contemporary graphical authentication schemes. The scheme is robust, secure and very convenient to use.
doi_str_mv 10.1109/ISPCC.2012.6224343
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6224343</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6224343</ieee_id><sourcerecordid>6224343</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-29bdf1b43b111d56c28c8f70e0783ffbeb45eafc52df7096e2feccdb22fd3a793</originalsourceid><addsrcrecordid>eNo1j99KwzAYxSMiqLMvoDd5gdZ8Sdskghej6BwMFNz9yJ8vNLJ1Jc0E396C89wczo_DgUPIPbAKgOnH9edH11WcAa9azmtRiwtSaKmgbqUAAaq9JLf_QYprUkzTF5slZQOK3ZDnVTJjH53Z09OEiZpT7nHIM8jxODzRJc3xgDQOGdP3XLJmQk_NOKajcf0duQpmP2Fx9gXZvr5su7dy875ad8tNGTXLJdfWB7C1sADgm9Zx5VSQDJlUIgSLtm7QBNdwP1PdIg_onLecBy-M1GJBHv5mIyLuxhQPJv3szofFL_k0Sn8</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Graphical user authentication: A time interval based approach</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Umar, Mohammad Sarosh ; Rafiq, M. Q. ; Ansari, J. A.</creator><creatorcontrib>Umar, Mohammad Sarosh ; Rafiq, M. Q. ; Ansari, J. A.</creatorcontrib><description>A number of authentication techniques have been proposed in the recent times that are based upon graphical methods. Text based passwords are most commonly used for authentication, however, they are highly vulnerable to several kinds of attacks. Graphical techniques are coming up as an attractive alternative to the conventional methods of authentication. In this paper we have proposed a graphical method of authentication that employs graphical coordinates along with a novel introduction of time interval between successive clicks. The user needs to recall the coordinates and the time interval of the successive clicks. This leads to the incorporation of the advantages of the recent graphical methods along with the added security achieved through the use of time interval. The proposed scheme has a much higher password space than the other contemporary graphical authentication schemes. The scheme is robust, secure and very convenient to use.</description><identifier>ISBN: 1467313173</identifier><identifier>ISBN: 9781467313179</identifier><identifier>EISBN: 9781467313186</identifier><identifier>EISBN: 1467313165</identifier><identifier>EISBN: 1467313181</identifier><identifier>EISBN: 9781467313162</identifier><identifier>DOI: 10.1109/ISPCC.2012.6224343</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Computers ; Dictionaries ; Electronic mail ; Force ; Graphical Passwords ; Security ; Servers</subject><ispartof>2012 IEEE International Conference on Signal Processing, Computing and Control, 2012, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6224343$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6224343$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Umar, Mohammad Sarosh</creatorcontrib><creatorcontrib>Rafiq, M. Q.</creatorcontrib><creatorcontrib>Ansari, J. A.</creatorcontrib><title>Graphical user authentication: A time interval based approach</title><title>2012 IEEE International Conference on Signal Processing, Computing and Control</title><addtitle>ISPCC</addtitle><description>A number of authentication techniques have been proposed in the recent times that are based upon graphical methods. Text based passwords are most commonly used for authentication, however, they are highly vulnerable to several kinds of attacks. Graphical techniques are coming up as an attractive alternative to the conventional methods of authentication. In this paper we have proposed a graphical method of authentication that employs graphical coordinates along with a novel introduction of time interval between successive clicks. The user needs to recall the coordinates and the time interval of the successive clicks. This leads to the incorporation of the advantages of the recent graphical methods along with the added security achieved through the use of time interval. The proposed scheme has a much higher password space than the other contemporary graphical authentication schemes. The scheme is robust, secure and very convenient to use.</description><subject>Authentication</subject><subject>Computers</subject><subject>Dictionaries</subject><subject>Electronic mail</subject><subject>Force</subject><subject>Graphical Passwords</subject><subject>Security</subject><subject>Servers</subject><isbn>1467313173</isbn><isbn>9781467313179</isbn><isbn>9781467313186</isbn><isbn>1467313165</isbn><isbn>1467313181</isbn><isbn>9781467313162</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1j99KwzAYxSMiqLMvoDd5gdZ8Sdskghej6BwMFNz9yJ8vNLJ1Jc0E396C89wczo_DgUPIPbAKgOnH9edH11WcAa9azmtRiwtSaKmgbqUAAaq9JLf_QYprUkzTF5slZQOK3ZDnVTJjH53Z09OEiZpT7nHIM8jxODzRJc3xgDQOGdP3XLJmQk_NOKajcf0duQpmP2Fx9gXZvr5su7dy875ad8tNGTXLJdfWB7C1sADgm9Zx5VSQDJlUIgSLtm7QBNdwP1PdIg_onLecBy-M1GJBHv5mIyLuxhQPJv3szofFL_k0Sn8</recordid><startdate>201203</startdate><enddate>201203</enddate><creator>Umar, Mohammad Sarosh</creator><creator>Rafiq, M. Q.</creator><creator>Ansari, J. A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201203</creationdate><title>Graphical user authentication: A time interval based approach</title><author>Umar, Mohammad Sarosh ; Rafiq, M. Q. ; Ansari, J. A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-29bdf1b43b111d56c28c8f70e0783ffbeb45eafc52df7096e2feccdb22fd3a793</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Authentication</topic><topic>Computers</topic><topic>Dictionaries</topic><topic>Electronic mail</topic><topic>Force</topic><topic>Graphical Passwords</topic><topic>Security</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Umar, Mohammad Sarosh</creatorcontrib><creatorcontrib>Rafiq, M. Q.</creatorcontrib><creatorcontrib>Ansari, J. A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Umar, Mohammad Sarosh</au><au>Rafiq, M. Q.</au><au>Ansari, J. A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Graphical user authentication: A time interval based approach</atitle><btitle>2012 IEEE International Conference on Signal Processing, Computing and Control</btitle><stitle>ISPCC</stitle><date>2012-03</date><risdate>2012</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><isbn>1467313173</isbn><isbn>9781467313179</isbn><eisbn>9781467313186</eisbn><eisbn>1467313165</eisbn><eisbn>1467313181</eisbn><eisbn>9781467313162</eisbn><abstract>A number of authentication techniques have been proposed in the recent times that are based upon graphical methods. Text based passwords are most commonly used for authentication, however, they are highly vulnerable to several kinds of attacks. Graphical techniques are coming up as an attractive alternative to the conventional methods of authentication. In this paper we have proposed a graphical method of authentication that employs graphical coordinates along with a novel introduction of time interval between successive clicks. The user needs to recall the coordinates and the time interval of the successive clicks. This leads to the incorporation of the advantages of the recent graphical methods along with the added security achieved through the use of time interval. The proposed scheme has a much higher password space than the other contemporary graphical authentication schemes. The scheme is robust, secure and very convenient to use.</abstract><pub>IEEE</pub><doi>10.1109/ISPCC.2012.6224343</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1467313173
ispartof 2012 IEEE International Conference on Signal Processing, Computing and Control, 2012, p.1-6
issn
language eng
recordid cdi_ieee_primary_6224343
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Authentication
Computers
Dictionaries
Electronic mail
Force
Graphical Passwords
Security
Servers
title Graphical user authentication: A time interval based approach
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T01%3A48%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Graphical%20user%20authentication:%20A%20time%20interval%20based%20approach&rft.btitle=2012%20IEEE%20International%20Conference%20on%20Signal%20Processing,%20Computing%20and%20Control&rft.au=Umar,%20Mohammad%20Sarosh&rft.date=2012-03&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.isbn=1467313173&rft.isbn_list=9781467313179&rft_id=info:doi/10.1109/ISPCC.2012.6224343&rft_dat=%3Cieee_6IE%3E6224343%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467313186&rft.eisbn_list=1467313165&rft.eisbn_list=1467313181&rft.eisbn_list=9781467313162&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6224343&rfr_iscdi=true