Combinatoric Drag–Pattern-Graphical-Password (DPGP)
Creating secure password has been limited attributable to password restriction and policy. Users tend to choose memorable passwords that are easy to guess. However, sophisticated systems assigned passwords that are difficult to remember. In this paper, the focus will be on the Drag–pattern-Graphical...
| Main Authors: | Sylla, Mohamed, Muhammad, Gul, Habib, Kaleem, Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
CIS Journal
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/38394/ http://irep.iium.edu.my/38394/1/Combinatoric_Drag%E2%80%93Pattern-Graphical-Password_%28DPGP%29.pdf |
Similar Items
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
On the use of image and emojis in graphical password application
by: Zabidi, Nur Syabila, et al.
Published: (2019)
by: Zabidi, Nur Syabila, et al.
Published: (2019)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010)
by: Wang, Liming, et al.
Published: (2010)
The effect of baroque music on the PassPoints graphical password
by: Gao, Haichang, et al.
Published: (2010)
by: Gao, Haichang, et al.
Published: (2010)
The Combinatorics of Lattice Polytopes
by: Hall, Thomas
Published: (2024)
by: Hall, Thomas
Published: (2024)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Can background baroque music help to improve the memorability of graphical passwords?
by: Gao, Haichang, et al.
Published: (2010)
by: Gao, Haichang, et al.
Published: (2010)
MGM503 - Combinatorics January 2019
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2019)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2019)
MGM503 - Combinatorics February 2021
by: PPSM, Pusat Pengajian Sains Matematik
by: PPSM, Pusat Pengajian Sains Matematik
MGM 503 - Combinatorics November 2006
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2006)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2006)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Combinatorics of unique maximal factorization families (UMFFs)
by: Daykin, D., et al.
Published: (2009)
by: Daykin, D., et al.
Published: (2009)
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Picture-Based Password Scheme
by: Seow, Yang Jiin
Published: (2019)
by: Seow, Yang Jiin
Published: (2019)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
MGM503 - Combinatorics
[Kombinatorik] - Disember 2016 - Januari 2017
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2017)
by: PPSM, Pusat Pengajian Sains Matematik
Published: (2017)
Ramsey Algebras: A Ramseyan Combinatorics For Universal Algebras
by: Teoh, Zu Yao
Published: (2018)
by: Teoh, Zu Yao
Published: (2018)
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)
by: Goh, Wen Bin
Published: (2014)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
by: Cheong, S., et al.
Published: (2014)
by: Cheong, S., et al.
Published: (2014)
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024)
by: Roslan, Nuur Alifah, et al.
Published: (2024)
Combinatorics of counting distinct fuzzy subgroups of certain dihedral group
by: Olayiwola, Abdulhakeem, et al.
Published: (2019)
by: Olayiwola, Abdulhakeem, et al.
Published: (2019)
Second Level Password Generator
by: Tay, Choo Chuan, et al.
Published: (2010)
by: Tay, Choo Chuan, et al.
Published: (2010)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Password practices of Swedish websites
by: Lim, Nena, et al.
Published: (2010)
by: Lim, Nena, et al.
Published: (2010)
Drag reduction in microfluidic
by: Ling Wang Ming, Fiona
Published: (2015)
by: Ling Wang Ming, Fiona
Published: (2015)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
DNA approach for password conversion generator
by: Chng, Chern Wei
Published: (2014)
by: Chng, Chern Wei
Published: (2014)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
Investigating drag reduction characteristic using okra mucilage as new drag reduction agent
by: Abdulbari, Hayder A., et al.
Published: (2011)
by: Abdulbari, Hayder A., et al.
Published: (2011)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Introduction to computer graphics
by: Zeki, Akram M.
Published: (2015)
by: Zeki, Akram M.
Published: (2015)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002)
by: Mohd Shahman , Samsul Ambia
Published: (2002)
Similar Items
-
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011) -
On the use of image and emojis in graphical password application
by: Zabidi, Nur Syabila, et al.
Published: (2019) -
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008) -
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010) -
The effect of baroque music on the PassPoints graphical password
by: Gao, Haichang, et al.
Published: (2010)