146 research outputs found

    Cued-Click Point Graphical Password Using Circular Tolerance to Increase Password Space and Persuasive Features

    Get PDF
    AbstractGraphical password can be used as an alternative to text based (alphanumeric) password in which users click on images to set their passwords. Text based password uses username and password. So recalling of password is necessary which may be a difficult one. Images are generally easier to be remembered than text and in Graphical password; user can set images as their password. Therefore graphical password has been proposed by many researchers as an alternative to text based password Graphical passwords can be applied to workstation, web log-in applications, ATM machines, mobile devices etc. This paper presents implementation of Cued click point (CCP) graphical password which uses circular tolerance. Then it is found that CCP with circular tolerance is better as compared to CCP with rectangular tolerance

    Graphical Password Scheme Using Cued Click Point and Persuasion with Multiple Images

    Get PDF
    There are three main categories of authentication system – token-based (what you have), biometric-based (who you are) and knowledge-based (what you know). Cued Click Point is a graphical password scheme which is a type of knowledge based authentication. In CCP, user clicks on one point per picture for an arrangement of pictures.CCP gives more prominent security than PassPoints in light of the fact that the quantity of pictures builds the workload for attackers. The proposed system uses persuasion allowing user’s choice to a certain extent while encouraging users towards stronger and less-vulnerable passwords.In the proposed system, the undertaking of choosing less secure passwords (which are simple for attackers to hack) is more monotonous, disheartening users from settling on such decisions.In actuality, this approach makes picking a more secure secret key less weight on clients, it is less demanding to take after the framework's recommendations for a protected password—an element lacking in many systems. CCP is an effective alternative to text-based passwords and other forms of traditional authentication system. Psychological studies have also revealed that human mind can recognize images faster than text and numbers. CCP can be applied to a system front-end which requires high level of security.This paper presents implementation of Cued Click Point (CCP) graphical password which uses persuasion along with multiple images

    Implementation of Captcha as Graphical Passwords For Multi Security

    Get PDF
    To validate human users, passwords play a vital role in computer security. Graphical passwords offer more security than text-based passwords, this is due to the reason that the user replies on graphical passwords. Normal users choose regular or unforgettable passwords which can be easy to guess and are prone to Artificial Intelligence problems. Many harder to guess passwords involve more mathematical or computational complications. To counter these hard AI problems a new Captcha technology known as, Captcha as Graphical Password (CaRP), from a novel family of graphical password systems has been developed. CaRP is both a Captcha and graphical password scheme in one. CaRP mainly helps in hard AI problems and security issues like online guess attacks, relay attacks, and shoulder-surfing attacks if combined with dual view technologies. Pass-points, a new methodology from CaRP, addresses the image hotspot problem in graphical password systems which lead to weak passwords. CaRP also implements a combination of images or colors with text which generates session passwords, that helps in authentication because with session passwords every time a new password is generated and is used only once. To counter shoulder surfing, CaRP provides cheap security and usability and thus improves online security. CaRP is not a panacea; however, it gives protection and usability to some online applications for improving online security

    A Survey on Security in Data Sharing Application for Decentralized Military Network

    Get PDF
    Portable hubs in military situations, for example, a front line or a threatening locale are liable to experience the ill effects of irregular system network and continuous allotments. Interruption tolerant system (DTN) advances are getting to be fruitful arrangements that permit remote gadgets conveyed by officers to correspond with one another and access the classified data or summon dependably by misusing outer stockpiling hubs. The absolute most difficult issues in this situation are the implementation of approval strategies and the approaches redesign for secure information recovery. Ciphertext-approach trait based encryption (CP-ABE) is a promising cryptographic answer for the entrance control issues. Be that as it may, the issue of applying CP-ABE in decentralized DTNs presents a few security and protection challenges as to the property denial, key escrow, and coordination of characteristics issued from distinctive powers. In this paper, we propose a safe information recovery plan utilizing CP-ABE for decentralized DTNs where various key powers deal with their qualities freely. We show how to apply the proposed instrument to safely and effectively deal with the private information dispersed in the disturbance tolerant military system

    Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism

    Get PDF
    This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwords of higher security, in the sense of being from an expanded effective security space. We use persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more difficult to guess, click-points

    A Newfangled Authentication Protocol Based On Audio Produced Principles

    Get PDF
    Graphical authentication is more proficient and more securable. An imperative convenience objective for information based authentication frameworks is to bolster client in selecting passwords for higher security in the feeling of being from an extended viable security space. Here we are utilizing x and y directions to pick a photo secret word. Also the photos in x and y directions are changing haphazardly and subsequently it is hard to locate the first picture. In our base paper the methodologies utilized are "Convincing signaled snap focuses"," Cued snap focuses" and "Pass focuses". Primary apparatuses utilized here are pccp, viewport and that is utilized for secret word creation. Viewport methodologies are utilized to significant client picked secret word and secure framework created arbitrary watchword that are hard to recollect. The pccp making a less guessable secret key is the least demanding game-plan. With a specific end goal to dodge "Shoulder surfing" calculation we are going for AES (Advanced encryption standard). In a contemporary mastery, the customary Authentication methodologies like "alphanumeric - usernames and passwords" can't be a versatile secured technique as it make out a critical downsides. It can't be protected and sound from programmers. Graphical passwords are a different option for existing alphanumeric passwords. In Graphical passwords clients click on pictures than sort a long, complex secret key. Exhaustive examination is finished by different analysts proposes that the photo's majority based authentication plans are essentially delicate as client tends to tap on hotspots in the pictures. A hotspot is the picture's territory which is effectively perceived against every single other picture, accordingly making such strategies defenseless. To make greater from the available confirmation, another convention "in light of the sound time stamps" making it hard for the shams to perform mystery. Here is a novel one of a kind answer for graphical validation defining so as To take into account sound time stamps another method for model called "A NEWFANGLED AUTHENTICATION PROTOCOL BASED ON AUDIO PRODUCED PRINCIPLES ". This model calls a sound time stamps and in addition the number of sound timestamps and scramble the secret word with message digest adaptation 5 and making it hard for the gatecrasher to break the watchword there by forcing the more elevated amounts of security to the framework. The gatecrasher can't get the time stamps and additionally check of time stamps and making this strategy more secure, dependable and difficult to figure

    An approach password graphic for access control web

    Get PDF
    Este artigo descreve a investigação de uma abordagem inovadora de um modelo de senha gráfica que suporta a autenticação segura em sistemas Web e que pretende solucionar o problema do espião de ombro. Para tal, desenvolveu-se um novo modelo de senha gráfica, baseada na imagem da página Web, que o utilizador tem aberta no momento em que efetua o seu registo de utilizador, e sobre a qual são desenhados traços, com dimensões, direções, e sequências, à sua escolha. Num estudo exploratório com participantes, que simularam ser espiões de ombro, verificou-se que mais dificilmente se perceciona quando um utilizador se autentica, usando uma senha gráfica, do que utilizado uma senha alfanumérica. O modelo de senha gráfica proposto foi desenhado iterativamente e centrado no utilizador. Para validar a sua segurança e usabilidade, foram feitos vários testes com participantes. Nesses estudos, pretendeu-se perceber o grau de eficácia e de memorização que este modelo de senha gráfica inovador proporciona aos utilizadores em ambiente Web. Os resultados obtidos mostraram que se obteve uma solução segura e usável, com potencial para ser usado em alternativa à senha alfanumérica, por forma a evitar o risco do espião de ombro

    The usability of knowledge based authentication methods on mobile devices

    Get PDF
    Mobile devices are providing ever increasing functionality to users, and the risks associated with applications storing personal details are high. Graphical authentication methods have been shown to provide better security in terms of password space than traditional approaches, as well as being more memorable. The usability of any system is important since an unusable system will often be avoided. This thesis aims to investigate graphical authentication methods based on recall, cued recall and recognition memory in terms of their usability and security

    Numerical, analytical, experimental study of fluid dynamic forces in seals

    Get PDF
    NASA/Lewis Research Center is sponsoring a program for providing computer codes for analyzing and designing turbomachinery seals for future aerospace and engine systems. The program is made up of three principal components: (1) the development of advanced three dimensional (3-D) computational fluid dynamics codes, (2) the production of simpler two dimensional (2-D) industrial codes, and (3) the development of a knowledge based system (KBS) that contains an expert system to assist in seal selection and design. The first task has been to concentrate on cylindrical geometries with straight, tapered, and stepped bores. Improvements have been made by adoption of a colocated grid formulation, incorporation of higher order, time accurate schemes for transient analysis and high order discretization schemes for spatial derivatives. This report describes the mathematical formulations and presents a variety of 2-D results, including labyrinth and brush seal flows. Extensions of 3-D are presently in progress
    • …
    corecore