• No results found

point-and-click

Cued Click Point Technique for Graphical Password Authentication

Cued Click Point Technique for Graphical Password Authentication

... Cued Click-Point method is very usable and provides great security using hotspot ...Cued Click Point is more secure than the previous graphical authentication ...Cued Click-Points ...

7

Persuasive Graphical Password Authentication Using Cued Click Point

Persuasive Graphical Password Authentication Using Cued Click Point

... five click points, one on each of five ...a click-point within the view ...a point in the current view port, they may press the Shuffle button to randomly reposition the view ...

5

CUED CLICK POINT (CCP) ALGORITHM FOR GRAPHICAL PASSWORD TO AUTHENTICATE SHOULDER SURFING RESISTANCE

CUED CLICK POINT (CCP) ALGORITHM FOR GRAPHICAL PASSWORD TO AUTHENTICATE SHOULDER SURFING RESISTANCE

... all click point on single image introduces hotspots ...selecting click point on same ...one click point[4]. When user click on a correct position on image, then next image ...

7

Graphical Password Authentication System Using Persuasive Cued Click Point

Graphical Password Authentication System Using Persuasive Cued Click Point

... Persuasive Technology was first articulated by Fogg as using technology to motivate and influence people to behave in a desired manner. Persuasive Technology is the emerging field of “interactive computing systems ...

8

INTEGRATING CLOUD PLATFORMS RESEARCH ON INTEGRATION OF FORCE.COM WITH GOOGLE CHARTING LIBRARIES

INTEGRATING CLOUD PLATFORMS RESEARCH ON INTEGRATION OF FORCE.COM WITH GOOGLE CHARTING LIBRARIES

... A developer can define application components, such as custom objects and fields, workflow rules, Visualforce pages, and Apex classes and triggers, using the point-and-click tools of t[r] ...

7

Defence against Online Password Guessing Attacks by using Persuasive Click Points

Defence against Online Password Guessing Attacks by using Persuasive Click Points

... To address the issue of PCCP was proposed. As with CCP, a password consists of five click points. During password creation, small view port area that is randomly positioned on the image is darkening. Users must ...

5

Utilising novel thiol-acrylate click reactions to synthesise controlled branched polymer emulsifiers

Utilising novel thiol-acrylate click reactions to synthesise controlled branched polymer emulsifiers

... focal point, and convergently attached to a polyfunctional ...focal point protecting group. Under the conditions of the focal point removal, elimination of the xanthate functionality, subsequent ...

335

A Review on Knowledge-Based Authentication Mechanism Using Secure Persuasive Cued Click-Points

A Review on Knowledge-Based Authentication Mechanism Using Secure Persuasive Cued Click-Points

... cued click-point (PCCP), a password consists of click points on ...a click-point within that view ...a point in the current view porting, they may press the Shuffle button to ...

5

GRAPHICAL PASSWORD AUTHENTICATION SYSTEM  WITH INTEGRATED  SOUND SIGNATURE

GRAPHICAL PASSWORD AUTHENTICATION SYSTEM WITH INTEGRATED SOUND SIGNATURE

... to click on the same regions selected at the time of creation of the ...Cued Click Points (CCP) is a proposed alternative to previous graphical authentication ...users click one point on each ...

5

Index Terms Graphical Passwords, Authentication, Click Points, Privacy, Password Protection, Guessing Attacks.

Index Terms Graphical Passwords, Authentication, Click Points, Privacy, Password Protection, Guessing Attacks.

... cued click-point based method with cued based graphical password ...cued click points (CCP) graphical password ...users click on one point on each image instead of clicking on different ...

7

Click synthesis and anti-bactrial activiy of novel tris-chalcones

Click synthesis and anti-bactrial activiy of novel tris-chalcones

... The products (5a-l) precipitated from the reaction mixture in a relatively pure state with no undesirable side reactions and were easily recrystallized in EtOH, with 86-99% yields.For all reactions, by addition of ...

7

Multilayer Graphical Password Authentication

Multilayer Graphical Password Authentication

... to click point an image and make a pattern which takes place of typing textual password graphical password are able to resist Brute Force Attack, Dictionary Attack,Social Engineering are malware ...

5

ECE-320 Lab 7: Discrete-Time PID and PI Controllers and sisotool

ECE-320 Lab 7: Discrete-Time PID and PI Controllers and sisotool

...  Right Click on the Root Locus plot, and choose Design Requirements then either New to add new constraints, or Edit to edit existing constraints.  At this point you have a choice of v[r] ...

6

Maintenance informatics dashboard design for through-life engineering services

Maintenance informatics dashboard design for through-life engineering services

... a point in the graph to see relevant detailed information, and users can click on a specific engine number to unveil a collection of events relating to a specific ...

6

Maintenance Informatics Dashboard Design for Through-life Engineering Services

Maintenance Informatics Dashboard Design for Through-life Engineering Services

... a point in the graph to see relevant detailed information, and users can click on a specific engine number to unveil a collection of events relating to a specific ...

7

Developing Interactive Advertisement in Internet Connected Televisions Using E Commerce

Developing Interactive Advertisement in Internet Connected Televisions Using E Commerce

... can click (Entry Point), if he chooses to, and be transferred onto the advertiser’s website, which is called the Landing ...Entry Point placed within the Interactive Program Guide that can be used to ...

9

KNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS

KNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS

... obvious click points by limiting the number of shuffles allowed during password creation or by progressively slowing system response in repositioning the viewport with every shuffle past a certain ...cued ...

8

Vol 3, No 10 (2015)

Vol 3, No 10 (2015)

... to click N points as shown in Fig ...each click point during authentication which means that image must be physically present in the client ...

7

Authentication Using Graphical Passwords-PCCP

Authentication Using Graphical Passwords-PCCP

... the click-point. For each click-point in a subsequent login attempt, this number is retrieved from the database and used to determine whether the click-point falls within the ...

6

Pre-melt-season sediment plume variability at Jökulsárlón, Iceland, a preliminary evaluation using in-situ spectroradiometry and satellite imagery

Pre-melt-season sediment plume variability at Jökulsárlón, Iceland, a preliminary evaluation using in-situ spectroradiometry and satellite imagery

... Eleven clear-sky days yielded usable imagery, covering the period 19 April – 30 May. MOD09GQ images were used for all days except 2 May, when the MOD09GQ image was cloud-affected so an MYD09GQ image was used instead. All ...

9

Show all 10000 documents...

Related subjects