Ray’s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - Issue 2012 by IJCTT Journal|
|Volume-3 Issue-2 |
|Year of Publication : 2012|
|Authors :Partha Pratim Ray.|
Partha Pratim Ray. "Ray’s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices"International Journal of Computer Trends and Technology (IJCTT),V3(2):230-236 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, I have proposed a new hybrid graphical password based system. The system is a combination of recognition and pure recall based techniques and that offers many advantages over the existing systems and may be more convenient for the user. My approach is resistant to shoulder surfing attack and many other attacks on graphical passwords. This scheme is proposed for smart hand held devices (like smart phones i.e. PDAs, ipod, iphone, etc.) which are more handy and convenient to use than traditional desktop computer systems.
 Knowledge based Authentication. (2011), http://searchsecurity.techtarget.com/ definition/ knowledge-based-authentication .
 Knowledge Based Authentication. (2011). http://csrc.nist.gov/archive/ kba/index.html.
 Weinshall, D, (2006), Cognitive authentication schemes safe against spyware, (short paper). IEEE Symposium on Security and Privacy.
 Hayashi, E., Christin, N., Dhamija, R.,and Perrig, A. (2008), Use Your Illusion: Secure authentication usable anywhere, 4th ACM Symposium on Usable Privacy and Security (SOUPS).
 Davis, D., Monrose, F., and Reiter, M. (2004), On user choice in graphical password schemes, 13th USENIX Security Symposium.
 Dhamija, R., and Perrig, A. (2000), Deja Vu: A User Study. Using Images for Authentication, 9th USENIX Security Symposium.
 Real User. (2011), www.realuser.com.
 Passfaces Corporation. (2011), The science behind Passfaces, White paper, http:// www. passfaces. com/enterprise/resources/white_papers.htm.
 Angeli, A., D., Coventry, L., Johnson, G., and Renaud, K. (2005), “Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems”, International Journal of Human-Computer Studies, 63(1-2):128-152.
Keywords — smart phones, graphical passwords, authentication, network security.