Graphical user authentication system (GUAS)
Nowadays, the most accepted computer authentication technique is to use alphanumerical usernames with text-based password. This method has been proven to have significant multiple weaknesses. For example, users tend to choose the passwords that can be easily cracked. On the other hand, if a password...
| Main Author: | Tan, Woei Wen |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/13402/ http://umpir.ump.edu.my/id/eprint/13402/1/FSKKP%20-%20TAN%20WOEI%20WEN.PDF |
Similar Items
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
A graphical browser for hypermedia systems
by: Yong, Huan Loon
Published: (1995)
by: Yong, Huan Loon
Published: (1995)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Investigation of the role of individual's gender in the design of graphical user interface for mobile learning device
by: Ling, Thong Chee, et al.
Published: (2020)
by: Ling, Thong Chee, et al.
Published: (2020)
ARM7 Processor Simulator with Graphical User Interface
by: Khaw, Boon Chai, et al.
Published: (2007)
by: Khaw, Boon Chai, et al.
Published: (2007)
A review of user authentication model for online banking system based on mobile IMEI number
by: Hammood, Waleed A., et al.
Published: (2020)
by: Hammood, Waleed A., et al.
Published: (2020)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
ViSim: a user-friendly graphical simulation tool for performance analysis of MANET routing protocols
by: Saquib, Nazmus, et al.
Published: (2011)
by: Saquib, Nazmus, et al.
Published: (2011)
A novel and efficient bilateral remote user authentication
scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin
by: Husam , N. S. Yasin
Published: (2021)
by: Husam , N. S. Yasin
Published: (2021)
Graphical user interfaces
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Graphical user authentication algorithm for mobile banking user
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
Framework for evaluating suitability of graphical user authentication for mobile banking
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
Smart mobile emergency system for paramedic user (SMES)
by: Khalisah, Abdul Basid
Published: (2014)
by: Khalisah, Abdul Basid
Published: (2014)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Strict Authentication Watermaking with Jpeg Compression (SAW-JPEG)
by: Jasni, Mohamad Zain
Published: (2008)
by: Jasni, Mohamad Zain
Published: (2008)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
ASP authentication using IP address / Kumar Mallanaidu
by: Kumar , Mallanaidu
Published: (2003)
by: Kumar , Mallanaidu
Published: (2003)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
Fabric authenticity method using fast Fourier transformation detection
by: Norislina, Ismail, et al.
Published: (2011)
by: Norislina, Ismail, et al.
Published: (2011)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
Adaptive tutoring system user preferences: Does gender matter?
by: Faizal Hazri, Mat Ripin, et al.
Published: (2017)
by: Faizal Hazri, Mat Ripin, et al.
Published: (2017)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
A graphical package for geometry / Hee Lee Li
by: Hee , Lee Li
Published: (2003)
by: Hee , Lee Li
Published: (2003)
Improving computational complexity using I-zag for text image authentication scheme
by: ‘Aqilah, Abd. Ghani
Published: (2024)
by: ‘Aqilah, Abd. Ghani
Published: (2024)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
User defined methods
by: Hakro, Dil Nawaz, et al.
Published: (2011)
by: Hakro, Dil Nawaz, et al.
Published: (2011)
Hand gesture based user interface system
by: Chin, Sui Yee
Published: (2013)
by: Chin, Sui Yee
Published: (2013)
A secure authentication scheme using locimetric and press touch code techniques
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
Fingerprint watermarking with tamper localization and exact recovery using multi-level authentication
by: Wei, Keat Lee, et al.
Published: (2018)
by: Wei, Keat Lee, et al.
Published: (2018)
Study user behaviour through event sharing module in mobile UniCAT system
by: Lye, Guang Xing
Published: (2015)
by: Lye, Guang Xing
Published: (2015)
Interactive user interface for food ordering system using QR code technology
by: Chai, Wei Ching
Published: (2014)
by: Chai, Wei Ching
Published: (2014)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Mobi parking navigator system (user dashboard module)
by: Mohd Na’imullah, Jamaludin
Published: (2013)
by: Mohd Na’imullah, Jamaludin
Published: (2013)
Similar Items
-
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014) -
A graphical browser for hypermedia systems
by: Yong, Huan Loon
Published: (1995) -
Secure login authentication system
by: Chow, Wen Chai
Published: (2018) -
Investigation of the role of individual's gender in the design of graphical user interface for mobile learning device
by: Ling, Thong Chee, et al.
Published: (2020) -
ARM7 Processor Simulator with Graphical User Interface
by: Khaw, Boon Chai, et al.
Published: (2007)