We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Pass No-Pass Graphical Authentication Service

by Vikram Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 5
Year of Publication: 2014
Authors: Vikram Verma
10.5120/16339-5630

Vikram Verma . Pass No-Pass Graphical Authentication Service. International Journal of Computer Applications. 94, 5 ( May 2014), 21-23. DOI=10.5120/16339-5630

@article{ 10.5120/16339-5630,
author = { Vikram Verma },
title = { Pass No-Pass Graphical Authentication Service },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 5 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 21-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number5/16339-5630/ },
doi = { 10.5120/16339-5630 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:16:47.992417+05:30
%A Vikram Verma
%T Pass No-Pass Graphical Authentication Service
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 5
%P 21-23
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This document proposes the use of a new graphical authentication service to be used for Cloud based security, Graphical Authentication systems are not prone to key-loggers, brute-force, dictionary attacks and thus they are much secure than traditional textual authentication service, thus making a graphical authentication service would provide a good security for our data siting on cloud, against various hacking techniques. Introduction to No-Pass click points provides an intrusion detection system where we use No-Pass to lock down system and thus prevent any kind of illegitimate access to the data siting on system.

References
  1. I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In 8th USENIX Security Symposium, August 1999.
  2. P. Dunphy and J. Yan. Do background images improve "Draw a Secret" graphical passwords? In 14th ACM Conference on Computer and Communications Security (CCS), October 2007.
  3. R. Weiss and A. De Luca. PassShapes-utilizing stroke based authentication to increase password memorability. In NordiCHI, pages 383-392. ACM, October 2008.
  4. PassFaces Corporation. The science behind PassFaces July 2009.
  5. D. Davis, F. Monrose, and M. Reiter. On user choice in graphical password schemes. In 13th USENIX Security Symposium, 2004.
  6. R. Dhamija and A. Perrig. Déjà vu: A using images for authentication. In 9th USENIX Security Symposium, 2000.
  7. Using Geographical Location as an Authentication Factor to enhance mCommerce Applications on Smartphones.
  8. S. Chiasson, P. C. van Oorschot, and R. Biddle. Graphical password authentication using Cued Click Points. In European Symposium on Research in Computer Security (ESORICS), LNCS 4734, pages 359{374, September 2007.
  9. Implicit authentication, HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security Pages 9-9 USENIX Association Berkeley, CA, USA ©2009.
Index Terms

Computer Science
Information Sciences

Keywords

Pass No-Pass Implicit Feedback authentication systems.