Review Papers | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014
A Review of the Graphical Password Based Authentication Schemes
Shraddha S. Banne, Prof. Kishor N. Shedge
Using the graphical password for providing the security is the heart of the modern security system. It has gained a lot of popularity in the last decade. In this paper, we present a comprehensive survey of all the modern graphical password providing mechanisms. We have also provided a classification of the existing password protection schemes. This survey also discuss the merits and the demerits of the existing password protection techniques.
Keywords: Graphical Password, Security primitives
Edition: Volume 3 Issue 10, October 2014
Pages: 2137 - 2139
How to Cite this Article?
Shraddha S. Banne, Prof. Kishor N. Shedge, "A Review of the Graphical Password Based Authentication Schemes", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14637, Volume 3 Issue 10, October 2014, 2137 - 2139
Similar Articles with Keyword 'Graphical Password'
A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology
R. Buvanesvari, V. Prasath
Similar Articles with Keyword 'Security primitives'
A Comprehensive Survey on Various Graphical Password Schemas against Shoulder Surfing Attack
Shreyal Deshmukh, Priyanka More
Implementation of Simple Text Based Shoulder Surfing Resistant Graphical Password using CAPTCHA and VRK
Vijayalaxmi Daundkar, Shyam Gupta
Similar Articles with Keyword 'Graphical'
A Comprehensive Study of Elasticsearch
Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu
Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Similar Articles with Keyword 'Password'
A New Cryptography Algorithm Based on ASCII Code
Yaser M.A. Abualkas
An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective
Ashish A Kulkarni, Dr. Shivaji R. Madan
Similar Articles with Keyword 'Security'
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Secure Methods for Supplychain Management to Protect from Attacks in Blockchain
B. Ratnakanth, K. Venkata Ramana
Similar Articles with Keyword 'primitives'
CaPGP: A De-Risking Measure for Insider Fraud in Financial Institutions
Monikka Reshmi Sethurajan
Review on Cipher X Ray Technique to Analyze and Implement Cryptographic Operation
Punam Hiwase, Sapna Khapre