Figure 20 - uploaded by Anastasios A. Economides
Content may be subject to copyright.
Source publication
Proof by knowledge authentication techniques" include traditional text passwords, visual passwords and graphical passwords. The paper compares these three techniques using an experiment. A total of 100 users participated in the experiment. After getting informed about the new authentication methods, users created their own text, visual and graphica...
Similar publications
Graphical passwords are implemented as an alternative scheme to replace alphanumeric passwords to help users to memorize their password. However, most of the graphical password systems are vulnerable to shoulder-surfing attack due to the usage of the visual interface. In this research, a method that uses shifting condition with digraph substitution...
Citations
Confidentiality and Authentication were once treated different but now-a-days, improvement in technology is demanding both of them to be used together. Though technology is increasing tremendously, smart hackers on the environment always challenges the authentication factors, thereby enforcing more number of factors for authentication to be included. As factors increase, failure rate for authentication may also be more when any one of the factors doesn’t work. A qualitative survey of user authentication systems being used in today’s environment is presented here and a comparative study of various authentication mechanisms used in the world of Information security by various researchers is shown.