Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements

View through CrossRef
Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme weaknesses. Even though the idea of graphical password scheme is still under analysis stage, many researchers have come out with a lot of vulnerabilities finding for current graphical password scheme. Literature studies on vulnerabilities finding has contributed for a development of method design features and requirements for pixel value graphical password scheme. This paper is organized as begin with a brief introduction on graphical password scheme, followed by literature study outcome, discussion on features and requirements, and enclosed with topic conclusion.
Title: Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Description:
Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme weaknesses.
Even though the idea of graphical password scheme is still under analysis stage, many researchers have come out with a lot of vulnerabilities finding for current graphical password scheme.
Literature studies on vulnerabilities finding has contributed for a development of method design features and requirements for pixel value graphical password scheme.
This paper is organized as begin with a brief introduction on graphical password scheme, followed by literature study outcome, discussion on features and requirements, and enclosed with topic conclusion.

Related Results

An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Penelitian ini mengembangkan aplikasi berbasis Python untuk mengevaluasi kekuatan password serta memberikan rekomendasi password yang lebih aman menggunakan alfabet fonetik NATO, T...
Efficient Plain Password Cryptanalysis Techniques
Efficient Plain Password Cryptanalysis Techniques
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common mea...
Usability Study on Textual and Graphical Passwords
Usability Study on Textual and Graphical Passwords
One of the most common methods used for authentication are passwords, in particular textual passwords. However, maintaining multiple textual passwords across various websites or in...
Organizational Password Policy
Organizational Password Policy
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycle...
Organizational Password Policy
Organizational Password Policy
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycle...
Pixel Value Graphical Password Scheme
Pixel Value Graphical Password Scheme
Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users to load their image as their password. PVAC extrac...
Graphical-based password for user authentication in internet of things
Graphical-based password for user authentication in internet of things
Internet of Things has become a significant and evolving technology that cannot be avoidable in most of the sectors. However, the Internet of Things security became a concern due t...

Back to Top