Information Security Engineering
|
|
- Alban Henry
- 5 years ago
- Views:
Transcription
1 Information Security Engineering Huiping Sun( ) sunhp@ss.pku.edu.cn
2 Graphical Password Human Computation 回顾
3 Graphical Password Reading Paper 回顾
4
5 Introduction 心理学基础 Recall Recognition Cued Recall Recognition is an easier memory task than recall Dual Coding Theory With the aid of a retrieval cue, more information can be retrieved
6 Introduction Déjà Vu
7 Introduction PassFaces
8 Introduction Pass-Go
9 Introduction 代表产品 GrIDSure PatternLock GridCode
10
11 Recall-Based DAS: Draw-A-Secret
12 Recall-Based BDAS: Background DAS
13 Recall-Based YAGP: Yet Another Graphical Password
14 Recall-Based Passdoodle
15 Recall-Based PassShapes
16 Recall-Based Pass-Go
17 Recognition-Based Deja Vu
18 Recognition-Based PassFaces recognise images from decoy images face random art everyday objects icons challenge-response system side security vs 3-5 decoy
19 Recognition-Based Story
20 Recognition-Based Use your Illusion
21 Cued Recall-Based Passpoints 171 login 19 14*14
22 Introduction CCP: Cued Click Points implicit feedback 96% 25 Login 7
23 Introduction PCCP: Persuasive CCP viewport hotspots 50 Login 8
24 My App is My Password!
25 Background Graphical password more applicable on smartphone than text password vulnerable to shoulder surfing attack existing graphical password require user proactively memorise password Graphical password based existing memory Authentication based existing memory weak password security questions dynamic security questions autobiographical authentication
26 Password Alternatives 后备认证 Where did you meet your spouse Wasilla High School
27 Password Alternatives 自传体认证
28 Password Alternatives APP 图标布局认证 Using Icon Arrangement for Fallback Authentication on Smartphones CHI 2014
29 Password Alternatives 动态安全问题 I Know What You Did Last Week! Do You? Dynamic Security Questions for Fallback Authentication on CHI 2015
30 Password Alternatives 动态安全问题 -APP 安装 Locked Your Phone Buy a New One? From Tales of Fallback Authentication on Smartphones to Actual MobileHCI 2015
31 PassApp Concept PassApp Firefox Kindle Amazon Evernote is a novel recognition-based graphical password which utilises user s Google Chrome Wikipedia Twitter Google Maps installed apps Instagram YouTube Gmail Facebook on their mobile devices LinkedIn Fruit Ninja Skype Google Earth as password OK Cancle
32 PassApp Mechanism same category, similar ranks, etc Decoy App Selection Mechanism App Marcket install a new app: add this app as key app, add 3 decoy apps uninstall a app: delete this app from key app libs and move it into blacklist, remove corresponding decoy apps from decoy app libs App Update Mechanism Decoy App library Key App library Key App Selection Mechanism Challenge Panel Generation Mechanism Authentication Mechanism Authenticate rule out the apps preinstalled by device and OS manufactures Mobile Device User
33
34 User Study Day 1 User Study 1: How well can users correctly recognise the apps they have installed? 42 participants Day 2 User Study 2: Firefox Kindle Amazon Evernote unlock10 times How well can PassApp perform on usability and user experience? Google Chrome Instagram Wikipedia YouTube Twitter Gmail Google Maps Facebook 42 *10 Login Time LinkedIn Fruit Ninja Skype Google Earth Success Rate OK Cancle
35 Memory about Installed Apps Participant ID (#0 - #41) #40 #30 #20 #10 # % 50% 60% 70% 80% 90% 100% # of Apps F-measure (%) Max:79, Min: 11, SD: 16.79
36 Login Time and Success Rate #40 Orientation Time Selection Time Confirmation Time Pariticipant ID (#0 - #41) #30 #20 #10 # Average Orientation Time (2.42s) Average Login Time (7.27s) Login Time (s) Average confirmation time: 0.76s
37 Number of Key Apps & Usability Indices 100% 100% F-measure (%) 90% 80% Success Rate (%) 90% 80% # of Apps # of Apps Orientation Time (s) Login Time (s) # of Apps # of Apps
38 Frequency of Using Apps & Usability Indices Orientation Time (s) y = (-0.357)*x R 2 = % <0.2times/days 21.66% t/d 23.11% 1-2 t/d 12.36% 3-5 t/d The Frequency of Use (Times / Day) 14.49% >5 t/d In user study 1, Participant need complete a web survey to mark the frequency of using the installed apps Login Time (s) The Frequency of Use (Times / Day) y = (-0.344)*x R 2 =
39 Security Analysis Brutal-force Attacks 0.055% One-time shoulder Surfing Attacks Multi-time shoulder Surfing Attacks Round Needed to Expose All Key Apps key apps y = (-6.86) *x R 2 = Monte Carlo Method # of Key Apps
40 Session 1: Session 2-4: Guessing Attacks Acquaintance Attacks Impersonated Login Rate (%) 80% 60% 40% 20% V1 V2 V3 V4 V5 V6 V7 Session 1, R 2 = Session 2, R 2 = Session 3, R 2 = Session 4, R 2 = V8 0% # of Key Apps
41 Discussion Key app selection too short or too many, popular apps, communication apps Decoy app selection app market, device manufacture, OS, language,etc Challenge panel generation (n key * m decoy * r rounds) Login time (challenge, backup authentication) Participant (field study in the future) Daily memory about other graphical elements photography, wallpapers, screenshots, avatars, etc privacy vs security vs usability
42 Conclusion PassApp is the first graphical password that utilizes user s existing memory about installed apps as password without registration stage without memory burden PassApp perform better usability than most graphical password acceptable login time: 7.27s (6.51s) high success rate: >95% PassApp has sufficient security than most graphical password brute-force attacks (0.055%) and dictionary attacks (0.75%) shoulder surfing attacks: average 30 times acquaintance attacks: can to some extent withstand (challenge)
43
44 Usability Evaluation 用户 & 环境 PAD PC
45 Usability Evaluation 任务 vs vs vs Login
46 Security Evaluation 安全 hash salting checker face hotspot
47 Methodology of Evaluation 评估方法 vs vs lab study vs field study IRB session Web Amazon Mechanical Turk
48
49
50 Homework 课后作业 IEEE Security & Privacy Magazine
51 Huiping Sun
Cyber Security Introduction
Cyber Security Introduction 2018.10.17 Huiping Sun( ) sunhp@ss.pku.edu.cn Course Overview 教师信息 sunhp@ss.pku.edu.cn https://huipingsun.github.io 1 1530E Course Overview 课程基本信息 14 17 (3204) 10 17 11 14 11
More informationGraphical Passwords: Learning from the First Twelve Years
Graphical Passwords: Learning from the First Twelve Years Robert Biddle, Sonia Chiasson, P.C. van Oorschot School of Computer Science Carleton University, Ottawa, Canada robert_biddle@carleton.ca, chiasson@scs.carleton.ca,
More informationA New Hybrid Graphical User Authentication Technique based on Drag and Drop Method
A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method Salim Istyaq, Khalid Saifullah Assistant Professor, Dept. of Computer Engineering, EES, University Polytechnic, Faculty
More informationUsable Privacy and Security, Fall 2011 Nov. 10, 2011
Usable Privacy and Security, Fall 2011 Nov. 10, 2011 YoungSeok Yoon (youngseok@cs.cmu.edu) Institute for Software Research School of Computer Science Carnegie Mellon University picture/photo based vs.
More informationPresented By: Miss Samya Ashraf Want Student ID
Paper: Haichang Gao, Xiyang Liu, Sidong Wang and Honggang Liu, Ruyi Dai, Design and Analysis of a Graphical Password Scheme, Fourth International Conference on Innovative Computing, Information and Control,
More informationInnovative Graphical Passwords using Sequencing and Shuffling Together
Innovative Graphical Passwords using Sequencing and Shuffling Together Rashmi Wable 1, Dr.Suhas Raut 2 N.K. Orchid College of Engineering and Technology, Solapur ABSTRACT Graphical authentication technology
More informationGraphical Passwords: Learning from the First Generation
TR-09-09: GRAPHICAL PASSWORDS 1 Graphical Passwords: Learning from the First Generation Robert Biddle, Sonia Chiasson, P.C. van Oorschot Abstract Numerous graphical password schemes have recently been
More informationCued Click Point Technique for Graphical Password Authentication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationA Survey on Different Graphical Password Authentication Techniques
A Survey on Different Graphical Password Authentication Techniques Saranya Ramanan 1, Bindhu J S 2 PG scholar, Department of Computer Science, College of Engineering, Perumon, Kerala, India 1 Associate
More informationCOMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationDivide and Conquer Approach for Solving Security and Usability Conflict in User Authentication
Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication Shah Zaman Nizamani Waqas Ali Sahito Shafique Awan Department of IT Department of IT Department of Computer
More informationNovel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords
Institute of Advanced Engineering and Science International Journal of Information & Network Security (IJINS) Vol.1, No.3, August 2012, pp. 163~170 ISSN: 2089-3299 163 Novel Shoulder-Surfing Resistant
More informationCARP: CAPTCHA as A Graphical Password Based Authentication Scheme
CARP: CAPTCHA as A Graphical Password Based Authentication Scheme Shraddha S. Banne 1, Prof. Kishor N. Shedge 2 Student, Dept. of Computer Engg, S.V.I.T, Chincholi, Sinnar, Nashik, India 1 Assistant Professor,
More informationInternational Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: Volume 14 Issue 2 APRIL 2015
Persuasive Cued Click Point Authentication Mechanism with Sound Signature MOUNESHWAR KANAMADI 1,AMIT SAWANT 2,JAMDADE MARUTI 3,4 MEGHARANI BAMBUGADE, 5 ROKADE KOMAL 1 Department of CSE, Ashokrao Mane Group
More informationMIBA: Multitouch Image-Based Authentication on Smartphones
MIBA: Multitouch Image-Based Authentication on Smartphones Daniel Ritter daniel.ritter@uni-ulm.de Florian Schaub florian.schaub@uni-ulm.de Marcel Walch marcel.walch@uni-ulm.de Michael Weber michael.weber@uni-ulm.de
More informationCybersecurity in 2016 and Lessons learned
Cybersecurity in 2016 and Lessons learned Dr. Yu Cai Associate Professor Program Chair, Computer Network & System Administration School of Technology Michigan Technological University cai@mtu.edu A Quick
More informationAuthentication Using Grid-Based Authentication Scheme and Graphical Password
Authentication Using Grid-Based Authentication Scheme and Graphical Password Vijayshri D. Vaidya 1 Department of Computer engineering SND COE & RC Yeola, India Imaran R. Shaikh 2 Department of Computer
More informationGraphical User Authentication Using Random Codes
Graphical User Authentication Using Random Codes Mr.D.S.Gawande 1, Manisha P. Thote 2, Madhavi M. Jangam 3, Payal P. Khonde 4, Payal R. Katre 5, Rohini V. Tiwade 6 1Assistant Professor, Computer Science
More informationSecuring Web Accounts Using Graphical Password Authentication through MD5 Algorithm
Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm Siddheshwar A. Suratkar Rahul A. Udgirkar Pratik D. Kale Amit A. Shelke Mohsin H. Shaikh Prof. D. C. Dhanwani Prof. CSE,
More informationDefenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,
More informationInternational Journal of Pure and Applied Sciences and Technology
Int. J. Pure Appl. Sci. Technol., 1(2) (2010), pp. 60-66 International Journal of Pure and Applied Sciences and Technology ISSN 2229-6107 Available online at www.ijopaasat.in Research Paper Security Analysis
More informationAn Ancient Indian Board Game as a Tool for Authentication
An Ancient Indian Board Game as a Tool for Authentication Sreelatha Malempati 1 and Shashi Mogalla 2 1 Department of Computer Science and Engineering RVR & JC College of Engineering, Guntur, A.P. e-mail:
More informationGraphical Password Using Captcha
International Journal of Advances in Applied Sciences (IJAAS) Vol. 5, No. 2, June 2016, pp. 94~100 ISSN: 2252-8814 94 Graphical Password Using Captcha Y. Chandra Sekhar Reddy, M. Venkateswara Rao, M. Kameswara
More informationSOCIAL LOGIN FOR MAGENTO 2 USER GUIDE
1 User Guide Social Login for Magento 2 Extension SOCIAL LOGIN FOR MAGENTO 2 USER GUIDE BSSCOMMERCE 1 2 User Guide Social Login for Magento 2 Extension Contents 1. Social Login for Magento 2 Extension
More informationGraphical Password or Graphical User Authentication as Effective Password Provider
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 9 September 2013 Page No. 2765-2769 Graphical Password or Graphical User Authentication as Effective
More informationISSN: (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationGraphical Password to Increase the Capacity of Alphanumeric Password
Graphical Password to Increase the Capacity of Alphanumeric Password Gaddam Ramu Computer Science & Engineering. S.R.Engineering College, Warangal, Telangana, India. Goje Roopa(Asst.Prof) Computer Science
More informationDESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS
http:// DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS Chalichima Harshitha 1, Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor
More informationSOCIAL LOGIN FOR MAGENTO 2
1 User Guide Social Login for Magento 2 SOCIAL LOGIN FOR MAGENTO 2 USER GUIDE BSS COMMERCE 1 2 User Guide Social Login for Magento 2 Contents 1. Social Login for Magento 2 Extension Overview... 3 2. How
More informationUser Authentication. Daniel Halperin Tadayoshi Kohno
CSE 484 / CSE M 584 (Autumn 2011) User Authentication Daniel Halperin Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others
More informationImage Password Based Authentication in an Android System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationELLUCIAN GO HOW-TO GUIDE
ELLUCIAN GO HOW-TO GUIDE 03.31.17 CONTENTS GET THE ELLUCIAN GO APP... CHOOSE ACM AS YOUR SCHOOL... SIGN IN... ELLUCIAN GO MENU... REGISTER FOR COURSES... MY SCHEDULE... MY GRADES... MY FINANCIALS... ACADEMICS
More informationENHANCEMENT OF SECURITY FEATURE IN GRAPHICAL PASSWORD AUTHENTICATION
International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN 2249-6831 Vol. 3, Issue 2, Jun 2013, 395-402 TJPRC Pvt. Ltd. ENHANCEMENT OF SECURITY FEATURE IN
More informationCAN WE ESCAPE PASSWORDS?
INFOSECURITY WITH PLYMOUTH UNIVERSITY CAN WE ESCAPE PASSWORDS? Prof. Steven Furnell Centre for Security, Communications & Network Research Plymouth University United Kingdom Introduction Represents an
More informationMULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION
MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION Vinothini T 1, Rajesh I 2, Kirupa Rani D 3 1 PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 2 Associate
More informationRay s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices
Ray s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices Partha Pratim Ray Department of Computer Science and Engineering, Surendra Institute of Engineering and Management,
More informationGraphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2
Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India mail2maruthi03@gmail.com
More informationInternational Journal of Advances in Engineering Research
GRAPHICAL PASSWORD AUTHENTICATION SYSTEM WITH INTEGRATED SOUND SIGNATURE 1 Anu Singh, 2 Kiran Kshirsagar, 3 Lipti Pradhan 1 Student, Department of Computer Engineering, Pune University 2 Student, Department
More informationCaptcha as Graphical Passwords (Security Primitive Based On Hard Ai Problems)
RESEARCH ARTICLE OPEN ACCESS Captcha as Graphical Passwords (Security Primitive Based On Hard Ai Problems) 1. Valusani Shrenika, M.Tech student, 2 Mr.D.Uma Vishweshwar,, Hyderabad Asst.Professor, Abstract
More informationPackage Contents. Device Overview. Navigation Buttons
1 Package Contents 7 Pandigital Nova Tablet ereader USB Cable AC Adapter Quick Start Guide User Guide (preloaded in device) Device Overview Navigation Buttons The navigation buttons at the bottom of the
More information上汽通用汽车供应商门户网站项目 (SGMSP) User Guide 用户手册 上汽通用汽车有限公司 2014 上汽通用汽车有限公司未经授权, 不得以任何形式使用本文档所包括的任何部分
上汽通用汽车供应商门户网站项目 (SGMSP) User Guide 用户手册 上汽通用汽车有限公司 2014 上汽通用汽车有限公司未经授权, 不得以任何形式使用本文档所包括的任何部分 SGM IT < 上汽通用汽车供应商门户网站项目 (SGMSP)> 工作产品名称 :< User Guide 用户手册 > Current Version: Owner: < 曹昌晔 > Date Created:
More informationKNOWLEDGE BASED AUTHENTICATION MECHANISM FOR SECURED DATA TRANSFER
KNOWLEDGE BASED AUTHENTICATION MECHANISM FOR SECURED DATA TRANSFER R.T.Narmadha1, R.T.Nivetha2, M.Roobia Fathima 2, P.Vijayalakshmi 2 1 Department of Information Technology, Info Institute of Engineering,
More informationVMware Horizon Client Install & Login iphone & ipad
VMware Horizon Client Install & Login iphone & ipad Introduction To remotely access VDI on your iphone and ipad, you must install the VMware Horizon Client app. As part of the installation process and
More informationAuthentication. Tadayoshi Kohno
CSE 484 / CSE M 584 (Winter 2013) Authentication Tadayoshi Kohno Thanks to Vitaly Shmatikov, Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Bennet Yee, and many others for sample
More informationHow To Change My Wordpress Database
How To Change My Wordpress Database Password On Instagram Account Built by one of the world's largest Instagram browsers INK361, this comprehensive widget that can showcase your Instagram account in the
More informationA Novel Graphical Password Authentication Scheme
A Novel Graphical Password Authentication Scheme 1 L. Lakshmi reddy & 2 J. Nagamuneiah 1 M.Tech (CSE), CREC, Tirupati, Email Id: lakshmireddy49@gmail.com 2 Associate professor, CREC, Tirupati, Email Id:
More informationVideo and Audio Communication
Skype - making video and phone conversations If you don't already have Skype on your PC, use the Microsoft Store to locate Skype and install it. Allow the install to access your camera and microphone when
More informationA Multi-Grid Graphical Password Scheme
A Multi-Grid Graphical Password Scheme Konstantinos CHALKIAS, Anastasios ALEXIADIS, George STEPHANIDES Dept. of Applied Informatics, Macedonia University, 156 Egnatia str., 540 06 Thessaloniki, Greece
More informationPrivate Browsing: an Inquiry on Usability and Privacy Protection
Private Browsing: an Inquiry on Usability and Privacy Protection Xianyi Gao*, Yulong Yang*, Huiqing Fu*, Janne Lindqvist*, Yang Wang+ *Rutgers University +Syracuse University Published in WPES 2014 What
More informationThe Design of Everyday Things
The Design of Everyday Things Byron Li Copyright 2009 Trend Micro Inc. It's Not Your Fault Donald A. Norman & His Book Classification 03/17/11 3 Norman Door Why Learn to think from different aspects Contribute
More informationA STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES
, pp.-04-08. Available online at http://www.bioinfo.in/contents.php?id=219 A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES ASHWINI FULKAR*, SUCHITA SAWLA, ZUBIN KHAN
More informationAttack Resistant User Authentication using Visual Verification Mechanism
Attack Resistant User Authentication using Visual Verification Mechanism Ms. V.Karthikeyani II Year M.E(CSE) Shree Venkateshwara Hi-Tech Engg College, Gobi mahe11191@gmail.com Dr. T. Senthil Prakash Professor
More informationRandomized Image Passwords and A QR Code based Circumnavigation Mechanism for Secure Authentication
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 04 September 2015 ISSN (online): 2349-6010 Randomized Image Passwords and A QR Code based Circumnavigation Mechanism
More informationTowards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique
Second Asia International Conference on Modelling & Simulation Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique Muhammad Daniel Hafiz
More informationCaptcha Authenticated Unwanted Message Filtering Technique for Social Networking Services
Captcha Authenticated Unwanted Message Filtering Technique for Social Networking Services Fathimath Shahistha M., Prabhakara B. K. 4 th Sem M.Tech, Dept. of CSE., SCEM, Visvesvaraya Technological University,
More informationGraphical password authentication using Pass faces
RESEARCH ARTICLE OPEN ACCESS Graphical password authentication using Pass faces Ms Grinal Tuscano*, Aakriti Tulasyan**, Akshata Shetty**, Malvina Rumao**, Aishwarya Shetty ** *(Department of Information
More informationSurvey on Various Techniques of User Authentication and Graphical Password
Survey on Various Techniques of User Authentication and Graphical Password Miss. Saraswati B. Sahu #1, Associate Prof. Angad Singh *2 1(M. Tech Scholar, Dept. of Information Technology, NIIST, Bhopal,
More informationUsability Testbed for Website Authentication Technologies
Usability Testbed for Website Authentication Technologies Maritza Johnson, Chaitanya Atreya, Adam Aviv, Mariana Raykova, Bryan Gwin, and Steve Bellovin 1 Financial Services Technology Consortium: Authenticating
More informationGoals. Understand UNIX pw system. Understand Lamport s hash and its vulnerabilities. How it works How to attack
Last Updated: Nov 7, 2017 Goals Understand UNIX pw system How it works How to attack Understand Lamport s hash and its vulnerabilities History of UNIX passwords Originally the actual passwords were stored
More informationKNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS
http:// KNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS G Anil Kumar 1, K Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor (CSE), Nalanda Institute of Engineering
More informationA NEW ALGORITHM FOR GRAPHICAL USER AUTHENTICATION BASED ON ROTATION AND RESIZING ARASH HABIBI LASHKARI
A NEW ALGORITHM FOR GRAPHICAL USER AUTHENTICATION BASED ON ROTATION AND RESIZING ARASH HABIBI LASHKARI A THESIS SUBMITTED FOR THE MASTER OF COMPUTER SCIENCE IN DATA COMMUNICATION & COMPUTER NETWORKING
More information信息检索与搜索引擎 Introduction to Information Retrieval GESC1007
信息检索与搜索引擎 Introduction to Information Retrieval GESC1007 Philippe Fournier-Viger Full professor School of Natural Sciences and Humanities philfv8@yahoo.com Spring 2019 1 Last week We have discussed: A
More informationUser Guide. Social Password Recovery Pro. Contents
Social Password Recovery Pro User Guide Contents About Benefits Requirements Installation Using GUI Version Right Click Menu Options Social Password Removal Feature Social Network Password Report Settings
More informationSecurity of End User based Cloud Services Sang Young
Security of End User based Cloud Services Sang Young Chairman, Mobile SIG Professional Information Security Association sang.young@pisa.org.hk Cloud Services you can choose Social Media Business Applications
More informationGet Smart. Get Smart. This is not about. What kind of phone you have Specific farming apps Actually size doesn t matter 30/04/2015
Get Smart Presented by: Marlene Williamson and Dr Debbie Care Get Smart Morning: Definitions & Understandings Afternoon: Camera & GPS Calendars & Tasks Collaboration Tools Documents This is not about.
More informationHow Many, How Often & How Long:
How Many, How Often & How Long: Comparable Metrics & Any Given Minute Update 2Q 2017 Nielsen s Comparable Metrics Report Provides An Apples-To- Apples View of Media Consumption Nielsen s Q2 2017 Comparable
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationRecall Based Authentication System- An Overview
Recall Based Authentication System- An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India 2 Professor: Dept of Computer
More informationPasswords. EJ Jung. slide 1
Passwords EJ Jung slide 1 Basic Problem? How do you prove to someone that you are who you claim to be? Any system with access control must solve this problem slide 2 Many Ways to Prove Who You Are What
More informationHow to install Internet Security for Android app
How to install Internet Security for Android app 1. Go to Google Play Store app. 2. In the dialog window enter Kaspersky Mobile Antivirus: Web Security & AppLock. Tap INSTALL to allow the app to install
More informationExploring Games for Improved Touchscreen Authentication on Mobile Devices
Exploring Games for Improved Touchscreen Authentication on Mobile Devices Padmaja Scindia pscindia@nyit.edu Jonathan Voris jvoris@nyit.edu New York Institute of Technology Department of Computer Science
More information5 Must-Have Magento Security Plugins
5 Must-Have Magento Security Plugins http://beacon.by/magazine/pdf/serverguy/5-must-have-magento-security-plugins?type=print 1/16 Table of Contents 1. About ServerGuy 2. WatchLog 3. Amasty s Admin Login
More informationBroadband internet connection ipad, Android tablet, Windows Surface RT or Pro, Chromebook Safari, Google Chrome, Microsoft Edge, Mozilla Firefox
TABLE OF CONTENTS OVERVIEW... 3 SYSTEM REQUIREMENTS... 3 INSTALLATION... 4 LOGGING INTO THE SOFTWARE... 4 STUDENT PASSWORDS... 5 TEACHER PASSWORDS... 5 GETTING YOUR STUDENTS STARTED... 6 OPEN LOGIN...
More informationApp Description Tips Download
YouTube App Description Tips Download A video app that allows users to view, share, discuss, and upload videos. You can create an account so that YouTube will remember your preferences. You can also subscribe
More informationGoogle Chromebook Starting Guide
Google Chromebook Starting Guide Now that you have received your Chromebook you will notice that it looks exactly like a laptop, but there are several differences between both devices. Chromebooks are
More informationPackage Contents. Device Overview. Unlocking the Screen
1 This Quick Start Guide covers the basics for initial setup and usage of your Pandigital Planet. For complete instructions on all features and functionality, refer to the User Guide after you have completed
More informationMobile Malfeasance. Exploring Dangerous Mobile Code. Jason Haddix, Director of Penetration Testing
Mobile Malfeasance Exploring Dangerous Mobile Code Jason Haddix, Director of Penetration Testing Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
More informationA Survey on Recall-Based Graphical User Authentications Algorithms
A Survey on Recall-Based Graphical User Authentications Algorithms D.Aarthi 1, Dr.K.Elangovan 2 1 School of Computer Science and Engineering, Bharathidasan University, Trichy, India 2 School of Computer
More informationDEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Abdul Rasheed. Sk 1 Asst. Professor Narasaraopeta Engineering College, Narasaraopet. rasheed4321@gmail.com
More informationSecurity in Graphical Authentication
Security in Graphical Authentication Robert G. Rittenhouse 1, Junaid Ahsenali Chaudry 2 and Malrey Lee 3 1 Keimyung Adams College, Keimyung University, Daegu, Republic of Korea 2 Department of Computer
More informationA1. Technical methodology
A1. Technical methodology The Ofcom mobile research app project is the latest phase of Ofcom s work to measure mobile performance and the consumer experience of using mobile services. The new methodology
More informationHighly Secure Authentication Scheme: A Review
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Highly Secure Authentication Scheme:
More information14 - Authentication in Practice
14 - Authentication in Practice Engineering & Public Policy Lorrie Cranor, Blase Ur, and Rich Shay February 26, 2015 05-436 / 05-836 / 08-534 / 08-734 Usable Privacy and Security # Today s class Biometrics
More informationSHOULDER SURFING RESISTANT GRAPHICAL PASSWORD
SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD Kruthi K 1, Kumuda B G 2, Nandhini N V 3, Mrs. R.Anitha 4 (Associate Professor) 1, 2, 3, 4 Department of Computer Science and Engineering, The National Institute
More informationTable of Contents. Introduction. Buttons of the table. Using the touchscreen. Using the keyboard. Connecting to Wi-Fi. Applications.
Table of Contents Introduction Buttons of the table Using the touchscreen Using the keyboard Connecting to Wi-Fi Applications Deleting Apps Email Skype Extra tips Introduction to using an Android Tablet
More informationEnhancing CAPTCHA based Image Authentication for ID and Password
ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Enhancing CAPTCHA based Image Authentication for E-mail ID and Password 1MACHARLA
More informationCMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices
Cleveland State University EngagedScholarship@CSU Electrical Engineering & Computer Science Faculty Publications Electrical Engineering & Computer Science Department 9-28-2018 CMAPS: A Chess-Based Multi-Facet
More informationEnhanced Textual Password Scheme for Better Security and Memorability
Enhanced Textual Password Scheme for Better Security and Memorability Hina Bhanbhro Department of Computer Syst. Eng. Faculty of Electrical, Electronics & Computer Systems Engineering Shaheed Benazir Bhutto
More informationKEEPOD QUICK USER GUIDE
Keepod Quick User Guide - Page 0 KEEPOD QUICK USER GUIDE March 2015 Keepod Quick User Guide - Page 1 You now are officially a Keepoder and can now make use of all the benefits related to Keepod and personal
More informationINTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com
INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what
More informationPixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review
Australian Journal of Basic and Applied Sciences, 7(4): 688-695, 2013 ISSN 1991-8178 Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review Mohd Afizi Bin Mohd Shukran, Mohd
More informationWhat is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.
P1L4 Authentication What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. Authentication: Who are you? Prove it.
More informationCANVAS OBSERVER GUIDE
CANVAS OBSERVER GUIDE This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License Table of Contents Introduction...3 What is the Observer role?...4 How can I use Canvas
More informationThematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices
Int'l Conf. Security and Management SAM'17 273 Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices Joshua Sherfield 1, Cheryl V. Hinds 2 1 Lawrence
More informationDEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Chippy.T chippyrevathy@gmail.com Dhanalakshmi Srinivasan Engineering College R.Nagendran nanonagendran@gmail.com
More informationSocial Media Login M2 USER MANUAL MAGEDELIGHT.COM SUPPORT E:
Social Media Login M2 USER MANUAL MAGEDELIGHT.COM SUPPORT E: SUPPORT@MAGEDELIGHT.COM P: +1-(248)-275-1202 License Key After successfully installing the Store Pickup extension on your Magento store, First
More informationUser Authentication Protocol
opass: A User Authentication Protocol Sao Vikram B., Gore Vishwanath P., Sankhe Bhakti A., Rananaware Rahul C., ABSTRACT Password security is significant for user authentication on small networking system
More informationCloud Frame Quick Start Guide
Cloud Frame Quick Start Guide The product's pictures and UI in this QSG are for reference only, and the product's appearance will vary with each model. Motion Sensor Remote illustration Open the battery
More information1 Technical methodology
Annex 1 1 Technical methodology The Ofcom mobile research app project is the latest phase of Ofcom s work to measure mobile performance and the consumer experience of using mobile services. The new methodology
More informationSecurity Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication
Technical Whitepaper Security Overview As a team, we have a long history of developing and delivering HR software solutions to customers worldwide, including many of the world s most-demanding organisations.
More information