VAP Code: A Secure Graphical Password for Smart Devices
In parallel to the increasing purchase rate of the smart devices, attacks on these devices are also increasing in an alarming rate. To prevent these attacks, many password-based authentication schemes are proposed. Among them, graphical password schemes are preferred on these devices due to their li...
| Main Authors: | Azad, Saiful, Rahman, Musfiq, Ranak, M. S. A. Noman, Ruhee, B. M. F. Kamal, Nisa, N. Nourin, Kabir, Nazrul, Rahman, Md. Arafatur, Jasni, Mohamad Zain |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier Ltd
2017
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/17912/ http://umpir.ump.edu.my/id/eprint/17912/1/fskkp-2017-saiful-VAP%20code%20a%20secure1.pdf |
Similar Items
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Raising Fairness Issue of Vehicle Routing Problem
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Data-Driven Augmented Reality for Scout Password Recognition in
Interactive Learning Environment
by: M. Soekarno, Putra, et al.
Published: (2024)
by: M. Soekarno, Putra, et al.
Published: (2024)
IoT Enabled Intra-Vehicular Communication for Designing A Smart Car
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
by: Mohammad Hameez, Mat Zin, et al.
Published: (2016)
Multibiometric systems based verification technique
by: Anwar, Farhat, et al.
Published: (2009)
by: Anwar, Farhat, et al.
Published: (2009)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
Graphical user interfaces
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
A connection probability model for communications networks under regional failures
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Investigation of the role of individual's gender in the design of graphical user interface for mobile learning device
by: Ling, Thong Chee, et al.
Published: (2020)
by: Ling, Thong Chee, et al.
Published: (2020)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
IoT enable relay network for demand based light intensity controlled seamless highway lighting system
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
A Store-and-delivery Based MAC Protocol for Air-ground Collaborative Wireless Networks for Precision Agriculture
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
A graphical package for geometry / Hee Lee Li
by: Hee , Lee Li
Published: (2003)
by: Hee , Lee Li
Published: (2003)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
CMT324 - COMPUTER GRAPHIC & VISUAL GRAPHIC JANUARY 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
Crowd Associated Network: Exploiting over a Smart Garbage Management System
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
A graphical browser for hypermedia systems
by: Yong, Huan Loon
Published: (1995)
by: Yong, Huan Loon
Published: (1995)
Similar Items
-
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016) -
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018) -
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018) -
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018) -
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)