IJCNIS Vol. 7, No. 3, 8 Feb. 2015
Cover page and Table of Contents: PDF (size: 821KB)
Full Text (PDF, 821KB), PP.57-64
Views: 0 Downloads: 0
Authentication, Graphical passwords, Pass Text passwords, Usability
Traditional alphanumeric passwords used for remote user authentication does not offer both usability and security. Graphical passwords were proposed as an alternative to these textual passwords for improving usability and security. This paper proposes a remote user authentication scheme, which extends the existing pass text scheme. The usability and security of the proposed scheme is analyzed. Using Morea tool the Usability of the proposed scheme is investigated.
C. Shoba Bindu, "Secure Usable Authentication Using Strong Pass text Passwords", International Journal of Computer Network and Information Security(IJCNIS), vol.7, no.3, pp. 57-64, 2015. DOI:10.5815/ijcnis.2015.03.08
[1]J.-C. Birget, D. Hong and N. Memon, Robust Discretization with an application to the Graphical Passwords,Availableat:citeseer.ist.psu.edu/birget03robust.htm Retrieved November 4, 2005.
[2]K. Renaud and E. Smith, Jiminy: Helping Users to Remember Their Passwords, Annual Conference of the South African Institute of Computer Scientists and Information Technologists, Pretoria, South Africa, 25-28 September 2001.
[3]A. Brostoff, Improving Password System Effectiveness, PhD Dissertation, Department of Computer Science University College London, September 30, 2004.
[4]N. Provos and D. Mazieres, A Future-Adaptable Password Scheme, USENIX Annual Technical Conference, Monterey, California, USA, June 6-11, 1999.
[5]R. Morris and K. Thompson, Password Security: a Case History, CACM, 1979, pp. 594--597.
[6]K. Renaud, Quantifying the Quality of Web Authentication Mechanisms. A Usability Perspective, Journal of Web Engineering, Volume 3 Issue 2, October 2004.
[7]Julie Thorpe, P. C. van Oorschot, Anil Somayaji, Pass-thoughts: authenticating with our minds, Proceedings of the 2005 workshop on New security paradigms, September, 2005, Lake Arrowhead, California.
[8]E. Bekkering, M. Warkentin and K. Davis, A Longitudinal Comparison of Four Password Procedures, Proceedings of the 2003 Hawaii International Conference on Business, Honolulu, HI, June 2003.
[9]Min-Shiang Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000.
[10]Das M. L., Saxena A. and Gulati V. P., “A dynamic ID-based remote user authentication scheme”, IEEE Trans. Consumer Electronics, May 2004, vol.50, No. 2: 629 -631.
[11]C. Shoba Bindu, P. Chandrasekhar Reddy and B. Satyanarayana, “Improved remote user authentication scheme preserving user anonymity”, International Journal of Computer Science and Network Security, vol. 8, no. 3, pp. 62-66, March 2008.
[12]Ajay Sharma, Deo Brat Ojha, “Password Hardened Biometric: A Complete Solution of Online Security”, International Journal of Computer Network and Information Security, 2013, 6, 42-48, DOI: 10.5815/ijcnis.2013.06.06
[13]G. E. Blonder, Graphical Passwords, United States Pattent 5559961, 1996.
[14]Pass Faces. Corporation, 2009 The Science Behind Pass faces, White paper, http://www.passfaces.com/enterprise/ resources/white_papers.htm.
[15]D. Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password schemes," in Proceedings of the 13th Usenix Security Symposium. San Diego, CA, 2004.
[16]Raj Mohammed, C. Shoba Bindu, P. Chandrasekhar Reddy and B. Satyanarayana, “A novel cognition based Graphical Authentication scheme which is resistant to shoulder-surfing attack”, in Proceedings of 2nd International conference on information Processing, ICIP 2008.
[17]C. Shoba Bindu, “Improved novel graphical password authentication scheme and usability study”, i-manager’s journal of Software Engineering, Vol. 3,No. 4, April- June 2009.
[18]I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
[19]R. V. Yampolskiy,”Secure Network authentication with PassText”, The IEEE International conference on Information and Technology ITNG’07, April 2007.
[20]R. V. Yampolskiy, Analyzing User Password Selection Behavior for Reduction of Password Space, The IEEE International Carnahan Conference on Security Technology (ICCST06), Lexington, Kentucky, October 17-19, 2006.
[21]Susan Wiedenbeck and Jim Waters & Leonardo Sobrado and Jean-Camille Birget “Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme” Proceedings of the working conference on Advanced visual interfaces, Pages 177-184. New York, USA 2006.
[22]Nairit Adhikary, Rohit Shrivastava, Ashwani Kumar, Sunil Kumar Verma, Monark Bag, Vrijendra Singh, “Battering Keyloggers and Screen Recording Software by Fabricating Passwords” , International Journal of Computer Network and Information Security, 2012, 5, 13-21, DOI: 10.5815/ijcnis.2012.05.02