To see the other types of publications on this topic, follow the link: Graphical-based password.

Dissertations / Theses on the topic 'Graphical-based password'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 15 dissertations / theses for your research on the topic 'Graphical-based password.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

English, Rosanne. "Modelling the security of recognition-based graphical password schemes." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3797/.

Full text
Abstract:
Recognition-based graphical passwords are a suggested alternative authentication mechanism which have received substantial attention in research literature. The literature often presents new schemes, usability studies or propose countermeasures for specific attacks. Whilst this is beneficial, it does not allow for consistent comparison of the security of recognition-based graphical password schemes. This thesis contributes a proposed solution to this problem. Presented in this thesis are models for estimating the number of attacks required before success for four aspects of the security of a r
APA, Harvard, Vancouver, ISO, and other styles
2

Alesand, Elias, and Hanna Sterneling. "A shoulder-surfing resistant graphical password system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138163.

Full text
Abstract:
The focus of this report is to discuss graphical password systems and how they can contribute to handle security problems that threaten authentication processes. One such threat is shoulder-surfing attacks, which are also reviewed in this report. Three already existing systems that are claimed to be shoulder-surfing resilient are described and a new proposed system is presented and evaluated through a user study. Moreover, the system is compared to the mentioned existing systems to further evaluate the usability, memorability and the time it takes to authenticate. The user study shows that tes
APA, Harvard, Vancouver, ISO, and other styles
3

Saevarsson, Freyr. "Combinatorics in Pattern-Based Graphical Passwords." Thesis, KTH, Matematik (Inst.), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102004.

Full text
Abstract:
Because of increased computing power it is necessary for modern passwords to be very long and complex, this makes them hard to remember. Research show that it might be easier for people to remember visual passwords instead of textual ones. The goal of this project was to find a safe graphical password scheme which does not require any modification on the server side. A proposed solution is called the Abagram which is a system that transforms patterns on a grid into textual passwords. The main idea behind the scheme is to assign each cell in the grid a letter or a symbol. The users select some
APA, Harvard, Vancouver, ISO, and other styles
4

Sparks, Jonathan William. "The Impact of Image Synonyms in Graphical-Based Authentication Systems." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/33.

Full text
Abstract:
Traditional text-based passwords used for authentication in information systems have several known issues in the areas of usability and security. Research has shown that when users generate passwords for systems, they tend to create passwords that are subject to compromise more so than those created randomly by the computer. Research has also shown that users have difficulty remembering highly secure, randomly created, text-based passwords. Graphical-based passwords have been shown to be highly memorable for users when applied to system authentication. However, graphical-based authentication s
APA, Harvard, Vancouver, ISO, and other styles
5

Aljahdali, Hani Moaiteq. "Using cultural familiarity for usable and secure recognition-based graphical passwords." Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6288/.

Full text
Abstract:
Recognition-based graphical passwords (RBGPs) are a promising alternative to alphanumeric passwords for user authentication. The literature presented several schemes in order to find the best types of pictures in terms of usability and security. This thesis contributes the positive use of cultural familiarity with pictures for usable and secure recognition-based graphical passwords in two different countries: Scotland and Saudi Arabia. This thesis presents an evaluation of a culturally-familiar graphical password scheme (CFGPS). This scheme is based on pictures that represent the daily life in
APA, Harvard, Vancouver, ISO, and other styles
6

Jebriel, Salem Meftah. "Empirical approach towards investigating usability, guessability and social factors affecting graphical based passwords security." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5399/.

Full text
Abstract:
This thesis investigates the usability and security of recognition-based graphical authentication schemes in which users provide simple images. These images can either be drawn on paper and scanned into the computer, or alternatively, they can be created with a computer paint program. In our first study, looked at how culture and gender might affect the types of images drawn. A large number of simple drawings were provided by Libyan, Scottish and Nigerian participants and then divided into categories. Our research found that many doodles (perhaps as many as 20%) contained clues about the parti
APA, Harvard, Vancouver, ISO, and other styles
7

Chowdhury, Soumyadeb. "Exploring the memorability of multiple recognition-based graphical passwords and their resistance to guessability attacks." Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6210/.

Full text
Abstract:
Most users find it difficult to remember traditional text-based passwords. In order to cope with multiple passwords, users tend to adopt unsafe mechanisms like writing down the passwords or sharing them with others. Recognition-based graphical authentication systems (RBGSs) have been proposed as one potential solution to minimize the above problems. But, most prior works in the field of RBGSs make the unrealistic assumption of studying a single password. It is also an untested assumption that RBGS passwords are resistant to being written down or verbally communicated. The main aim of the resea
APA, Harvard, Vancouver, ISO, and other styles
8

Gyorffy, John. "Token-based Graphical Password Authentication." Master's thesis, 2009. http://hdl.handle.net/10048/411.

Full text
Abstract:
Given that phishing is an ever increasing problem, a better authentication system than the current alphanumeric system is needed. Because of the large number of current authentication systems that use alphanumeric passwords, a new solution should be compatible with these systems. We propose a system that uses a graphical password deployed from a Trojan and virus resistant embedded device as a possible solution. The graphical password would require the user to choose a family photo sized to 441x331 pixels. Using this image, a novel, image hash provides an input into a cryptosystem on the embedd
APA, Harvard, Vancouver, ISO, and other styles
9

Ji, Shuo-Heng, and 紀碩恆. "User Authentication based on Graphical Password." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/74376935584765869568.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>資訊工程系碩士班<br>102<br>Traditional text-based password authentication scheme has the drawbacks of being easily cracked for weak passwords, and being hard to remember for strong ones. In recent years, graphical password has been proposed as an alternative solution for the authentication problem. This paper proposes a graphical password authentication scheme which uses the EMD (exploiting modification direction method) technique to hide a one-time password into an image. In order to obtain the one-time password from the image, user must pick the positions of the image as the same a
APA, Harvard, Vancouver, ISO, and other styles
10

Fang, Chiung-Cheng, and 方炯程. "A Map Based Graphical-Password Authentication System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73702059966334727495.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>99<br>認證系統使用文字密碼已經有段相當長的時間。文字密碼本質上是安 全的,然而,卻也有些非常嚴重的缺點,記憶性與安全性問題。根據 先前一些研究指出,人類對於記憶圖形的能力是比記憶文字要高出許 多的。因此,便有許多研究提出圖形密碼的概念來解決文字密碼的缺 點。Wiedenbeck 等人於2005 提出PassPoints,在此系統中使用者密 碼為一張圖片上有順序的五個點。為讓使用者記憶較少的點,卻擁有 更高的安全強度。基於使用極大尺寸圖片作為密碼空間的概念,我們 提出了以地圖為基礎的圖形密碼認證系統PassMap,其密碼為世界地 圖上有順序的兩個點。根據實驗結果,PassMap 不僅減少使用者記憶 上的負擔,在實際操作上也便於使用。而在安全考量上,PassMap 除 了提供更高的Entropy,也大幅增加了攻擊的成本。
APA, Harvard, Vancouver, ISO, and other styles
11

FanChiang, Chun-Hsun, and 范姜俊勛. "Pass-Maps:A Usable Map-Based Scheme of Graphical Password." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/65819970639463181085.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊網路與多媒體研究所<br>96<br>In recent years, several graphical password schemes are proposed to overcome the drawbacks of text-based passwords. However, the classification of these schemes is not consistent in prior studies. Thus, we classify the existing schemes according to the events of input passwords, clicking and drawing. This thesis also provides a concept of combining the two types of graphical password schemes. We adopt maps as background pictures and conduct a user study to verify the superiority of using maps. We collected several images that are divided into two groups whi
APA, Harvard, Vancouver, ISO, and other styles
12

FanChiang, Chun-Hsun. "Pass-Maps:A Usable Map-Based Scheme of Graphical Password." 2008. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2407200809461200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

QIU, Pei-Jia, and 邱培嘉. "Observation Attacks Resistant Graphical Password Schemes Based on Number-Icon-Location." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/15092888377481448699.

Full text
Abstract:
碩士<br>國立臺中教育大學<br>資訊工程學系<br>103<br>Common textual password schemes and graphical password schemes are vulnerable to observation attacks, in which the adversary can obtain the user's password information while users in the login process by using the shoulder-surfing attack and/or the hidden-camera attack. In 2002, Sobrado and Birget proposed three observation attacks resistant graphical password schemes. Since then, many graphical password schemes with different degrees of resistance to observation attacks have been proposed. However, none of these schemes can achieve both sufficient security a
APA, Harvard, Vancouver, ISO, and other styles
14

Nguyen, Thanh An. "Vision based curve reconstruction algorithms and their application to graphical password." Thesis, 2009. http://spectrum.library.concordia.ca/976377/1/MR63296.pdf.

Full text
Abstract:
Curve reconstruction is the problem of approximating a curve or multiple curves from a point cloud. Curve reconstruction problem has received numerous attention over the last few decades due to its significant application in geometric modeling. In this thesis, based on the relationship between human vision and curve reconstruction, two Gestalt laws have been identified for the curve reconstruction: the law of proximity indicating that our vision tends to perceptually group near objects together and the law of continuation pointing out that objects following a consistent continuous direction ar
APA, Harvard, Vancouver, ISO, and other styles
15

Liao, Dun-Min, and 廖惇旻. "Design and Analysis of Highly Usable Text-Based Capture Attacks Resistant Graphical Password Schemes." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/40201852816209961687.

Full text
Abstract:
碩士<br>國立臺中教育大學<br>資訊工程學系<br>102<br>Password schemes are the most widely used user authentication mechanisms for various application systems. Conventional textual password schemes are vulnerable to capture attacks, including the shoulder-surfing attacks, the camera attacks, the spyware attacks, and the wiretapping attacks. Thus, many capture attacks resistant graphical password schemes based on various techniques have been proposed. However, as most users are familiar with textual password schemes, some researchers have proposed text-based capture attacks resistant graphical password schemes. U
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!