[PDF][PDF] Securing Image Password by using Persuasive Cued Click Points with AES Algorithm

S Chaturvedi, R Sharma - … ) International Journal of Computer Science and …, 2014 - Citeseer
In Digital environment authentication plays a major role. For authentication purpose the
graphical based technique is used. The purpose of this paper is increasing the security …

[PDF][PDF] User authentication using graphical password scheme: a more secure approach using Mobile Interface

DD Walanjkar, V Nandedkar - … Journal of Innovative Research in Computer …, 2014 - Citeseer
Textual password is most coomn method use for password authentication. In today's use of
internet is increasing day by day. For security purpose the user selects password, that …

[PDF][PDF] An Effective User Authentication Method Using Persuasive Cued Click Points

A Bellam - International Journal of Computer Engineering & …, 2013 - ijces.org
It is an evolution of Persuasive Cued Click Points graphical password scheme which
includes usability and security evaluations. This paper includes the persuasion to influence …

[PDF][PDF] Graphical password authentication techniques: a review

A Gokhale, V Waghmare - … Journal of Science and Research (IJSR) …, 2013 - academia.edu
In today's IT world, for the computer and information security the user authentication and
authorization play a significant role. For this authentication a password is very important …

Secure user authentication & graphical password using cued click-points

SB Sahu - arXiv preprint arXiv:1505.01594, 2015 - arxiv.org
The major problem of user registration, mostly text base password, is well known. In the
login user be inclined to select simple passwords which is frequently in mind that are …

[PDF][PDF] Image based authentication for folder security using persuasive cued click-points and SHA

S Hande, N Dighade, R Bhusari, M Shende… - IOSR Journal of …, 2014 - academia.edu
In this paper Image Based Authentication application is applied on folder's (folders that are
confidential to user), since the studies till date have shown that textual passwords are more …

[PDF][PDF] A Recognization Based Graphical Password System

N Kawale, S Patil - International Journal of Current Engineering and …, 2014 - Citeseer
The most important thing in the network security is to provide user authentication. Therefore
passwords are used in the vast majority of computers and communication systems for …

[PDF][PDF] Implementation of authentication using graphical password cloud computing

A Shaikh, R Pathan, R Patel… - … Research Journal of …, 2018 - academia.edu
Now a day's security to the information which is stored in system is very important.
Authentication is the operation to supply guaranteed information security and the graphical …

[PDF][PDF] Graphical password scheme using cued click point and persuasion with multiple images

A Sarim, R Jayesh, K Ishan, S Adil… - Int J Recent Innovation …, 2018 - academia.edu
There are three main categories of authentication system–token-based (what you have),
biometric-based (who you are) and knowledge-based (what you know). Cued Click Point is …

[PDF][PDF] Graphical Password based authentication system with sound sequence

S Sayed, A Mohid, M Pal, M Haji - International Journal of Computer …, 2016 - academia.edu
There have been many graphical password schemes proposed as alternatives to text
passwords. Research and experience show that alpha-numeric passwords are inefficient …