[PDF][PDF] Reduction of Password Guessing Attacks using Click Point

P Biswas, MM Patil, M Biswas - … 8887) Proceedings on Emerging Trends in …, 2013 - Citeseer
The main aim of the work on the subject is to reduce password guessing attack in a
computer security system by creating graphical passwords for which pixels are chosen from …

[PDF][PDF] Survey On Captcha Based Diffrent Technique

R Suryawanshi, V Rathi - Open Access International Journal of Science …, 2018 - oaijse.com
This investigation intends to consider the present watchword plots and to framework and
develop another made progress graphical secret word contrive. CaRP is CAPTCHA as a …

[PDF][PDF] Facultad de Matemática y Computación Instituto de Criptografıa

LS Plasencia - 2021 - accesoabierto.uh.cu
PassPoint es una técnica de autenticación gráfica que basa su funcionamiento en la
selección de 5 puntos en una imagen. Una vulnerabilidad detectada radica en la posible …

Towards Improving the Security of the Software Supply Chain

H Afzali - 2021 - search.proquest.com
A software supply chain comprises a series of steps performed to develop and distribute a
software product. History has shown that each of these steps is vulnerable to attacks that can …

[PDF][PDF] Automated attacks on pass Point-Style graphical passwords

KD Kumar - Journal of Computer Applications (JCA), 2011 - jcaksrce.org
Users click on one point per image for a sequence of images, the next image is based on the
previous click-point. Users preferred Cued Click Points (CCP) to Pass Points selecting and …

[图书][B] Usable Secure Interfaces for Mobile Devices

IA Olade - 2020 - search.proquest.com
The aim of this thesis is to address and contribute to the research evidence on what it means
to implement usable security interfaces in mobile devices given their increasing importance …

Multi Dimensional Sterling Conception For System Security

MBB Vikhe, A Solanki, MMD Nirmal - International Journal of Innovations in … - neliti.com
Apart from being liable to social engineering attacks, text primarily based secrets are either
weak-and-memorable or secure-but-difficult-to-remember If the password is machine …

[PDF][PDF] Implementation Of A Graphical Based Password For Folder Cryptography

MSL Dhapade - International journal of Engineering Research and … - Citeseer
Now a day's most of the user are facing problem for providing the security to the folder, so
that it will not be accesses by the unauthorised user. Sometimes our folder is going to be …

[PDF][PDF] Using persuasive technology in click based graphical passwords

S Veerasekaran, A Khade, VB Gaikwad - Int J Tech Res Appl, 2015 - scholar.archive.org
Knowledge based authentication mechanisms have several problems that are well known.
The knowledge based authentication mechanisms include several techniques like text …

[PDF][PDF] What do we know about threats from well-intentioned users? A literature review

N Derbentseva, B Fraser, S Gibbon, A Hawton - 2015 - cradpdf.drdc-rddc.gc.ca
We surveyed open academic and practitioner information security literature on nonmalicious
user threat behaviours with the purpose of 1) identifying possible non-malicious user threat …