Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
Nowadays, the most accepted computer authentication technique is to use alphanumerical usernames with text-based password. This method has been proven to have significant multiple weaknesses. For example, users tend to choose the passwords that can be easily cracked. On the other hand, if a password...
| Main Author: | Zolkipli, Mohamad Fadli |
|---|---|
| Format: | Research Report |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/36460/ http://umpir.ump.edu.my/id/eprint/36460/1/Study%20of%20graphical%20authentication%20system%20based%20on%20persuasive%20rotation%2C%20resizing%20and%20cued%20click%20point%20%28GUAS%29.wm.pdf |
Similar Items
Graphical user authentication system (GUAS)
by: Tan, Woei Wen
Published: (2014)
by: Tan, Woei Wen
Published: (2014)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A dual-watermarking with QR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A graphical browser for hypermedia systems
by: Yong, Huan Loon
Published: (1995)
by: Yong, Huan Loon
Published: (1995)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
Designing a persuasive physical activity application for older workers: Understanding end- user perceptions
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
Graphical processes with abelian rotation symmetry
by: Rosli, Ahmad Aqwa
Published: (2023)
by: Rosli, Ahmad Aqwa
Published: (2023)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Database System Model of Tender Management System in Kadastra
by: Noraziah, Ahmad, et al.
Published: (2007)
by: Noraziah, Ahmad, et al.
Published: (2007)
Moderating effects of cross-cultural dimensions on the relationship between persuasive smartphone application's design and acceptance-loyalty
by: Faisal, Serri
Published: (2018)
by: Faisal, Serri
Published: (2018)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
Design a Technique for Minimizing Unnecessary Handoff
in Mobile Wireless Networks
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Strict Authentication Watermaking with Jpeg Compression (SAW-JPEG)
by: Jasni, Mohamad Zain
Published: (2008)
by: Jasni, Mohamad Zain
Published: (2008)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Cultural factors affecting persuasive design of smartphone applications to maintain customer loyalty
by: Faisal, Serri, et al.
Published: (2018)
by: Faisal, Serri, et al.
Published: (2018)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Fabric authenticity method using fast Fourier transformation detection
by: Norislina, Ismail, et al.
Published: (2011)
by: Norislina, Ismail, et al.
Published: (2011)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
ASP authentication using IP address / Kumar Mallanaidu
by: Kumar , Mallanaidu
Published: (2003)
by: Kumar , Mallanaidu
Published: (2003)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
Graphical user authentication algorithm for mobile banking user
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Similar Items
-
Graphical user authentication system (GUAS)
by: Tan, Woei Wen
Published: (2014) -
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016) -
A dual-watermarking with QR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016) -
A graphical browser for hypermedia systems
by: Yong, Huan Loon
Published: (1995) -
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)