A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
This paper mainly focuses on two things: secured graphical password and hotel management system. The aim of this study is to propose a new Hotel Management System that is secured from a shoulder surfing attack using a graphical password. This graphical password has been introduced by previous resear...
| Main Authors: | Deshinta, Arrova Dewi, Ayong Angue Nchama, Alberto Santiago |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
INTI International University
2018
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1502/ http://eprints.intimal.edu.my/1502/1/v1_2018_25.pdf |
Similar Items
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012)
by: Por, Lip Yee
Published: (2012)
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
Camouflage cursor anti-shoulder surfing technique
by: Teng, Sin Liang
Published: (2015)
by: Teng, Sin Liang
Published: (2015)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
A PROTOTYPE OF STORM WATER CHANNEL IOT (SWCI) TO PREVENT FLOOD DAMAGE IN MALAYSIA
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)
by: Tey, Boon Hau
Published: (2018)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Android Application for Managing Urgent Convalescent Plasma Blood Request for Covid19 Treatment
by: Olid, Nasir, et al.
Published: (2022)
by: Olid, Nasir, et al.
Published: (2022)
Design and Implementation of Online Examination System for a Higher Educational Institution
by: Nyamupanemunda, Larry, et al.
Published: (2022)
by: Nyamupanemunda, Larry, et al.
Published: (2022)
A Review of Data Analytics Adoption in Business Industry
by: Chong, Fong Kim, et al.
Published: (2019)
by: Chong, Fong Kim, et al.
Published: (2019)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
DEVELOPMENT OF CLOUD-BASED MEDIA PLAYER USING MICROSOFT AZURE SERVICES
by: Chong, Fong Kim, et al.
Published: (2018)
by: Chong, Fong Kim, et al.
Published: (2018)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
Study on Security Testing-as-a-Service (TaaS) in Cloud Environment
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
Planning Application with Voice Recognition to Assist Procrastinators in Managing Time
by: Kayalvily, Tabianan, et al.
Published: (2018)
by: Kayalvily, Tabianan, et al.
Published: (2018)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
Integrated Car Park System for Smart Parking Solution
by: Harprith Kaur, Randhawa, et al.
Published: (2019)
by: Harprith Kaur, Randhawa, et al.
Published: (2019)
Utilize Medical Text Data to Estimate Disease Types by Using Naïve Bayes and ANN Classifier
by: Mujiono, Sadikin, et al.
Published: (2021)
by: Mujiono, Sadikin, et al.
Published: (2021)
Cloud based Heartbeat Rate Monitoring System with Location Tracking
by: Malathy, Batumalay*, et al.
Published: (2020)
by: Malathy, Batumalay*, et al.
Published: (2020)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
The Air and Sound Pollution Monitoring System using Internet of Things and Cloud Based Data Analysis
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Sentiment Analytics for Monitoring and Analyzing Fan Page Posts
by: Harprith Kaur*, Randhawa, et al.
Published: (2020)
by: Harprith Kaur*, Randhawa, et al.
Published: (2020)
Arabic words recognition technique for pattern matching using SIFT, SURF and ORB
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
Mobile-Based Digital Car Plate Number for Future Automotive Industry
by: Malathy, Batumalay, et al.
Published: (2019)
by: Malathy, Batumalay, et al.
Published: (2019)
A Computational System Approach
To Develop Students’ Emotion Oriented System as Feedback Tool for
Lecturers to Enhance Teaching and Learning
by: Deshinta, Arrova Dewi, et al.
Published: (2012)
by: Deshinta, Arrova Dewi, et al.
Published: (2012)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Uncovering Relationship between Sleep Disorder and Lifestyle using Predictive Analytics
by: Ying, Sham Fang, et al.
Published: (2022)
by: Ying, Sham Fang, et al.
Published: (2022)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Monitoring Social Distancing Compliance Using Image Processing Algorithm
by: Lai, Yi Lun, et al.
Published: (2022)
by: Lai, Yi Lun, et al.
Published: (2022)
QR-code based E-wallet System using Android platform
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Data-Driven Augmented Reality for Scout Password Recognition in
Interactive Learning Environment
by: M. Soekarno, Putra, et al.
Published: (2024)
by: M. Soekarno, Putra, et al.
Published: (2024)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
Graphical user interfaces
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
Similar Items
-
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012) -
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010) -
Camouflage cursor anti-shoulder surfing technique
by: Teng, Sin Liang
Published: (2015) -
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019) -
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)