A secure authentication scheme using locimetric and press touch code techniques
A password is one of the most used access control procedures applied in virtually all digital and computing appliances. Generally, a password is a word or a string of characters used for user authentication to prove identity or access approval to gain access to a resource, which is to be kept secret...
| Main Author: | Noor Elya Afiqah, Che Nordin |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/27173/ http://umpir.ump.edu.my/id/eprint/27173/1/34.A%20secure%20authentication%20scheme%20using%20locimetric%20and%20press%20touch%20code%20techniques.pdf |
Similar Items
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
Digital watermarking scheme for QR code security
by: Tan Lei Lei, Joanna, et al.
Published: (2021)
by: Tan Lei Lei, Joanna, et al.
Published: (2021)
Secure student attendance system based on geo-location and QR code technologies
by: Noor Fathin Shahirah, Ahmat
Published: (2018)
by: Noor Fathin Shahirah, Ahmat
Published: (2018)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Colour number coding scheme for time-varying visualisation in glassy ion trajectories
by: Mohamad Sharif, Johan, et al.
Published: (2006)
by: Mohamad Sharif, Johan, et al.
Published: (2006)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024)
by: Rakshitha, M.V., et al.
Published: (2024)
Improving computational complexity using I-zag for text image authentication scheme
by: ‘Aqilah, Abd. Ghani
Published: (2024)
by: ‘Aqilah, Abd. Ghani
Published: (2024)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Robust Watermarking Scheme Using Chinese Remainder Theorem-Based Error Correcting Codes
by: Goh, Vik Tor
Published: (2005)
by: Goh, Vik Tor
Published: (2005)
A novel and efficient bilateral remote user authentication
scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
A study of touching behavior for authentication in touch screen smart devices
by: Alariki, Ala Abdulhakim, et al.
Published: (2016)
by: Alariki, Ala Abdulhakim, et al.
Published: (2016)
Development of secure web base press release site (TOC, Abstract, Chapter 1 and Reference only)
by: Eidul Ameen Sahul Hameed,
Published: (2014)
by: Eidul Ameen Sahul Hameed,
Published: (2014)
Generating UML class diagram from source codes using multi-threading technique
by: Abdullah, Saif Khalid
Published: (2015)
by: Abdullah, Saif Khalid
Published: (2015)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
OrangeCode : Website to learn coding via gaming
by: Nasrul Arif, Zakria
Published: (2019)
by: Nasrul Arif, Zakria
Published: (2019)
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013)
by: Gündüz, Feyza, et al.
Published: (2013)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
ASP authentication using IP address / Kumar Mallanaidu
by: Kumar , Mallanaidu
Published: (2003)
by: Kumar , Mallanaidu
Published: (2003)
Strict Authentication Watermaking with Jpeg Compression (SAW-JPEG)
by: Jasni, Mohamad Zain
Published: (2008)
by: Jasni, Mohamad Zain
Published: (2008)
Usability improvements for touch-screen mobile flight booking application: a case study
by: Gündüz, Feyza, et al.
Published: (2012)
by: Gündüz, Feyza, et al.
Published: (2012)
Security management in wireless sensor networks with a public key based scheme
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Securing U-Healthcare sensor networks using public key based scheme
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
A key management scheme with encoding and improved security for wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
Source code optimizer using local optimization approach for java based generic code clone detection
by: Ikhwan Muhammad, Hillmee
Published: (2019)
by: Ikhwan Muhammad, Hillmee
Published: (2019)
Similar Items
-
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018) -
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017) -
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020) -
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016) -
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)