Picture-Based Password Scheme
| Main Author: | Seow, Yang Jiin |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/3698/ http://eprints.utar.edu.my/3698/1/fyp_IB_2019_SYJ_1607612.pdf |
Similar Items
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)
by: Goh, Wen Bin
Published: (2014)
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012)
by: Por, Lip Yee
Published: (2012)
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010)
by: Wang, Liming, et al.
Published: (2010)
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
A security enhanced timestamp-based password authentication scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Combinatoric Drag–Pattern-Graphical-Password (DPGP)
by: Sylla, Mohamed, et al.
Published: (2013)
by: Sylla, Mohamed, et al.
Published: (2013)
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
Second Level Password Generator
by: Tay, Choo Chuan, et al.
Published: (2010)
by: Tay, Choo Chuan, et al.
Published: (2010)
Network authentication with time expired scheme and random generated password / Muhamad Syuhaimi Baharuddin
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
by: Baharuddin, Muhamad Syuhaimi
Published: (2004)
Password practices of Swedish websites
by: Lim, Nena, et al.
Published: (2010)
by: Lim, Nena, et al.
Published: (2010)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Big Picture Codec for Multimedia Conferencing System
by: Ramadass, Sureswaran
Published: (2007)
by: Ramadass, Sureswaran
Published: (2007)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
by: Cheong, S., et al.
Published: (2014)
by: Cheong, S., et al.
Published: (2014)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
DNA approach for password conversion generator
by: Chng, Chern Wei
Published: (2014)
by: Chng, Chern Wei
Published: (2014)
Enhanced password-based authentication protocol / Lee Chee Kiam.
by: Lee, Chee Kiam
Published: (2000)
by: Lee, Chee Kiam
Published: (2000)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
On the use of image and emojis in graphical password application
by: Zabidi, Nur Syabila, et al.
Published: (2019)
by: Zabidi, Nur Syabila, et al.
Published: (2019)
One-Time Password Authentication System In Website
by: Azham Helmi, Azmi
Published: (2023)
by: Azham Helmi, Azmi
Published: (2023)
Pictures from the Edge
Published: (2011)
Published: (2011)
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002)
by: Mohd Shahman , Samsul Ambia
Published: (2002)
Factors contributing to panel defects and their correlation in colour picture tube manufacturing
by: Lim, Sui Tar
Published: (2006)
by: Lim, Sui Tar
Published: (2006)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
The effect of baroque music on the PassPoints graphical password
by: Gao, Haichang, et al.
Published: (2010)
by: Gao, Haichang, et al.
Published: (2010)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Improvement vehicle starting system through user password
by: Mohd Afize Syafri, Mohd Ajwi
Published: (2009)
by: Mohd Afize Syafri, Mohd Ajwi
Published: (2009)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Diverse Stills: Picturing the Landscape
by: Gray, Michael, et al.
Published: (2019)
by: Gray, Michael, et al.
Published: (2019)
Similar Items
-
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014) -
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012) -
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011) -
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008) -
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010)