Research Article

Pass No-Pass Graphical Authentication Service

by  Vikram Verma
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Issue 5
Published: May 2014
Authors: Vikram Verma
10.5120/16339-5630
PDF

Vikram Verma . Pass No-Pass Graphical Authentication Service. International Journal of Computer Applications. 94, 5 (May 2014), 21-23. DOI=10.5120/16339-5630

                        @article{ 10.5120/16339-5630,
                        author  = { Vikram Verma },
                        title   = { Pass No-Pass Graphical Authentication Service },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 94 },
                        number  = { 5 },
                        pages   = { 21-23 },
                        doi     = { 10.5120/16339-5630 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A Vikram Verma
                        %T Pass No-Pass Graphical Authentication Service%T 
                        %J International Journal of Computer Applications
                        %V 94
                        %N 5
                        %P 21-23
                        %R 10.5120/16339-5630
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This document proposes the use of a new graphical authentication service to be used for Cloud based security, Graphical Authentication systems are not prone to key-loggers, brute-force, dictionary attacks and thus they are much secure than traditional textual authentication service, thus making a graphical authentication service would provide a good security for our data siting on cloud, against various hacking techniques. Introduction to No-Pass click points provides an intrusion detection system where we use No-Pass to lock down system and thus prevent any kind of illegitimate access to the data siting on system.

References
  • I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In 8th USENIX Security Symposium, August 1999.
  • P. Dunphy and J. Yan. Do background images improve "Draw a Secret" graphical passwords? In 14th ACM Conference on Computer and Communications Security (CCS), October 2007.
  • R. Weiss and A. De Luca. PassShapes-utilizing stroke based authentication to increase password memorability. In NordiCHI, pages 383-392. ACM, October 2008.
  • PassFaces Corporation. The science behind PassFaces July 2009.
  • D. Davis, F. Monrose, and M. Reiter. On user choice in graphical password schemes. In 13th USENIX Security Symposium, 2004.
  • R. Dhamija and A. Perrig. Déjà vu: A using images for authentication. In 9th USENIX Security Symposium, 2000.
  • Using Geographical Location as an Authentication Factor to enhance mCommerce Applications on Smartphones.
  • S. Chiasson, P. C. van Oorschot, and R. Biddle. Graphical password authentication using Cued Click Points. In European Symposium on Research in Computer Security (ESORICS), LNCS 4734, pages 359{374, September 2007.
  • Implicit authentication, HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security Pages 9-9 USENIX Association Berkeley, CA, USA ©2009.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Pass No-Pass Implicit Feedback authentication systems.

Powered by PhDFocusTM