• No results found

[PDF] Top 20 Human Interaction in Shoulder Surfing Security

Has 10000 "Human Interaction in Shoulder Surfing Security" found on our website. Below are the top 20 most common "Human Interaction in Shoulder Surfing Security".

Human Interaction in Shoulder Surfing Security

Human Interaction in Shoulder Surfing Security

... attentional shoulder surfing, three main operations such as covert attention, perceptual grouping, and parallel motor operation, are combined together for deriving a PIN ...attentional shoulder ... See full document

5

A Shoulder Surfing Resistant Graphical Verification System

A Shoulder Surfing Resistant Graphical Verification System

... PC security and insurance. Regardless, human exercises, for instance, picking unpleasant passwords and contributing passwords in an unverifiable way are seen as "the weakest association" in the ... See full document

9

Implementation of Graphical Authentication System for Shoulder Surfing Attacks

Implementation of Graphical Authentication System for Shoulder Surfing Attacks

... Author presents a novel idea for user authentication that we call pass-thoughts. Recent advances in Brain Computer Interface (BCI) technology indicate that there is potential for a new type of human-computer ... See full document

9

A New Methodology On Resistant Graphical Authentication Scheme

A New Methodology On Resistant Graphical Authentication Scheme

... procedure human shoulder surfing attack is prevented and a secure transaction many mobile App and Server is established by using session Key ...to shoulder surfing and accidental ... See full document

8

A Survey on Shoulder Surfing Resistant Graphical Authentication Systems

A Survey on Shoulder Surfing Resistant Graphical Authentication Systems

... ABSTRACT: Authentication based on passwords is used largely in applications for computer security and privacy. However, humanactions such a choosing wrong passwords and inputted passwords in an not secure way are ... See full document

5

A Shoulder Surfing Resistance using HMAC Algorithm

A Shoulder Surfing Resistance using HMAC Algorithm

... computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as” the weakest link” in the authentication ...to shoulder ... See full document

5

Shoulder Surfing Attack Prevention using Color Pass Method

Shoulder Surfing Attack Prevention using Color Pass Method

... as human shoulder-surfing and camera based ...against shoulder surfing ...strong security against shoulder surfing attacks and have intelligent user ... See full document

10

A Comprehensive Survey On Graphical Passwords And Shoulder Surfing Resistant Technique Analysis

A Comprehensive Survey On Graphical Passwords And Shoulder Surfing Resistant Technique Analysis

... from security threats from all over the ...and shoulder surfing resistant technique. Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or ... See full document

7

Security Enhancement in Shoulder Surfing Attacks using Passpoints for Random Similar Images (PRSIm)

Security Enhancement in Shoulder Surfing Attacks using Passpoints for Random Similar Images (PRSIm)

... a human focus in common [22, 23]. The human nature is that when asked to click any particular pixels the people will focus on a particular points of same frequency which is illustrated in figure 1 which are ... See full document

8

A Novel Approach to Resist Shoulder Surfing Attack

A Novel Approach to Resist Shoulder Surfing Attack

... ensure security, the attacker should not able to guess the PIN just by seeing the ...against shoulder surfing ...where human users are ... See full document

6

PASSMATRIX  An Authentication System to Resist Shoulder Surfing Attacks

PASSMATRIX An Authentication System to Resist Shoulder Surfing Attacks

... to shoulder surfing attack as well as the Smudge ...restrict shoulder surfing attack. To resist shoulder surfing attack it uses session password ... See full document

6

Smart Locker System to Crack Shoulder Surfing Techniques

Smart Locker System to Crack Shoulder Surfing Techniques

... providing security to the applications in the smartphones, but they are not up to the ...and shoulder surfing, where the passwords can be easily ...improves security and users ... See full document

6

DIGITAL LOCK: A HYBRID AUTHENTICAIONMr. Dipak P. Umbarkar1, Prof. Megha singh2

DIGITAL LOCK: A HYBRID AUTHENTICAIONMr. Dipak P. Umbarkar1, Prof. Megha singh2

... and shoulder surfing are ...from shoulder surfing attack which is becoming relatively a large ...to shoulder- surfing but they have their particular weaknesses like usability ... See full document

7

Authentication System in Social Networks

Authentication System in Social Networks

... the security and protection it is the simplest effective technique consist of two screen captures when brightness is high have to enter correct pin digit and when brightness is low have to enter the fake ...high ... See full document

7

Implementation of Passmatrix Based Shoulder Surfing Resistant Graphical Authentication System

Implementation of Passmatrix Based Shoulder Surfing Resistant Graphical Authentication System

... password security and protection are assumed fundamental part in PC application with increasing in PC innovation, for the diverse sorts of PC wrongdoing, misrepresentation and ... See full document

8

3D SECURE PASSWORD

3D SECURE PASSWORD

... These techniques generate session passwords and are resistant to dictionary attack, brute force attack and shoulder-surfing .This technique use grid for session passwords generation. Ratings should be given ... See full document

5

Advanced Scalable Shoulder Surfing Resistance Password Authentication Scheme

Advanced Scalable Shoulder Surfing Resistance Password Authentication Scheme

... from shoulder surfing which is also a big ...better security against dictionary and brute force attacks as password changes for every ...scalable shoulder surfing resistance graphical ... See full document

7

A Survey On Resisting Shoulder Surfing Attack Using Graphical Password

A Survey On Resisting Shoulder Surfing Attack Using Graphical Password

... no shoulder surfing resistance, Zhao et ...text-based shoulder surfing resistant graphical password scheme, S3PAS, in which the user has to find his textual password and then follow special ... See full document

5

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM

... To overcome the disadvantages of textual password we proposed the graphical password in a banking sector as a real time scenario. Graphical password and a virtual keyboard shuffling method is used to protect the ... See full document

8

NAVI: Novel authentication with visual information

NAVI: Novel authentication with visual information

... This paper presented NAVI, a novel graphical password scheme where the credentials of the user are a route designed on a predetermined map. We believe that NAVI is the first model to combine strong graphical passwords ... See full document

10

Show all 10000 documents...