Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
In this research work, a graphical method using shifting directions is proposed. The proposed method is based on knowledge-based indirect image selection method to perform authentication. A user needs to use the registered images and shifting direction to identify the pass-images used in each challe...
| Main Author: | Tey, Boon Hau |
|---|---|
| Format: | Thesis |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/11153/ http://studentsrepo.um.edu.my/11153/1/Tey_Boon_Hau.pdf http://studentsrepo.um.edu.my/11153/2/Tey_Boon_Hau.pdf |
Similar Items
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Camouflage cursor anti-shoulder surfing technique
by: Teng, Sin Liang
Published: (2015)
by: Teng, Sin Liang
Published: (2015)
Sistem Pengurusan Inventori Perisian / Tey Su Lin
by: Tey, Su Lin
Published: (2001)
by: Tey, Su Lin
Published: (2001)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
Simulation of quantum growing network / Ong Boon Teong
by: Ong , Boon Teong
Published: (2003)
by: Ong , Boon Teong
Published: (2003)
Sistem maklumat penapis air / Chew Boon Piew
by: Chew, Boon Piew
Published: (2002)
by: Chew, Boon Piew
Published: (2002)
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012)
by: Por, Lip Yee
Published: (2012)
Sistem maklumat penapis air / Chew Boon Piew
by: Chew, Boon Piew
Published: (2002)
by: Chew, Boon Piew
Published: (2002)
Peer-to-peer application using Microsoft .Net Framework / Tan Boon Yin
by: Tan, Boon Yin
Published: (2004)
by: Tan, Boon Yin
Published: (2004)
Online chatting system for online community system / Lim Boon Hong
by: Lim, Boon Hong
Published: (2002)
by: Lim, Boon Hong
Published: (2002)
Panel Doctor System (PDS) for employee medical information system / Teh Boon Heng
by: Teh, Boon Heng
Published: (2002)
by: Teh, Boon Heng
Published: (2002)
Implementation of IPv6 Flow Label in UMJaNetSim / Au Yee Boon
by: Au , Yee Boon
Published: (2004)
by: Au , Yee Boon
Published: (2004)
Arabic words recognition technique for pattern matching using SIFT, SURF and ORB
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
Preventing delayed cracks in deep drawing processes of SUS304 cylindrical cups using a coated die / Phoo Yoong Hau
by: Phoo, Yoong Hau
Published: (2019)
by: Phoo, Yoong Hau
Published: (2019)
Development of objective-oriented components for ATM networks simulation with emphasis on switch architecture /
Tan Boon Pin
by: Tan, Boon Pin
Published: (2001)
by: Tan, Boon Pin
Published: (2001)
Essays on public health in developing countries / Tey Nai Peng
by: Tey, Nai Peng
Published: (2017)
by: Tey, Nai Peng
Published: (2017)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
by: Tan , Chee Hau
Published: (2020)
by: Tan , Chee Hau
Published: (2020)
Talk and surf more for less
Published: (2008)
Published: (2008)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Enhancing cooperation in non-linear systems in game theory / Tey Siew Kian
by: Tey, Siew Kian
Published: (2017)
by: Tey, Siew Kian
Published: (2017)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Effect of doping fillers towards corn starch based green polymer electrolytes / Teoh Kok Hau
by: Teoh, Kok Hau
Published: (2012)
by: Teoh, Kok Hau
Published: (2012)
E-Lecture online system / Lee Boon Keong
by: Lee, Boon Keong
Published: (2003)
by: Lee, Boon Keong
Published: (2003)
Sistem maklumat penapis air / Chew Boon Piew
by: Chew , Boon Piew
Published: (2002)
by: Chew , Boon Piew
Published: (2002)
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
Threat analysis using artificial neural network
by: Yee, Chan Pheng
Published: (2009)
by: Yee, Chan Pheng
Published: (2009)
Health care and socio-economic support of the elderly in Peninsular Malaysia / Tey Hwei Choo.
by: Tey, Hwei Choo
Published: (1995)
by: Tey, Hwei Choo
Published: (1995)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
An evaluation of security features for preventing illegal distribution of digital content using quantitative methods
by: Muhammad Isma Farhan, Mohd Raza, et al.
Published: (2025)
by: Muhammad Isma Farhan, Mohd Raza, et al.
Published: (2025)
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Design of an ultra wideband low noise amplifier for cognitive radio applications / Tey Yong Yuen
by: Tey, Yong Yuen
Published: (2017)
by: Tey, Yong Yuen
Published: (2017)
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
by: Tey, Siew Kian
Published: (2009)
by: Tey, Siew Kian
Published: (2009)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Similar Items
-
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016) -
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018) -
Camouflage cursor anti-shoulder surfing technique
by: Teng, Sin Liang
Published: (2015) -
Sistem Pengurusan Inventori Perisian / Tey Su Lin
by: Tey, Su Lin
Published: (2001) -
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)