International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 266

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.4 / 10


     

Online Password Guessing Attacks by Using Persuasive Cued Click Points

Priyanka A. Dadmode, Kiran I. Devadkar


Abstract: Graphical Password essentially uses images or representation of images as password. Human brain is good in remembering picture than textual character. This paper work merges pass points, cued click points and persuasive cued click points. The major goal of this work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess. In this paper, the selection of click points depends upon the method selected by user, selection of sound. Sound gives the security for right click points.


Keywords: Authentication, graphical passwords, guessing attacks


Edition: Volume 4 Issue 12, December 2015


Pages: 1186 - 1188


DOI: https://www.doi.org/10.21275/NOV152165



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Priyanka A. Dadmode, Kiran I. Devadkar, "Online Password Guessing Attacks by Using Persuasive Cued Click Points", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 1186-1188, https://www.ijsr.net/getabstract.php?paperid=NOV152165, DOI: https://www.doi.org/10.21275/NOV152165



Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal, Renuka Singh

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023

Pages: 2966 - 2970

Security in Kubernetes: A Comprehensive Review of Best Practices

Dinesh Reddy Chittibala

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article
Top