A Graphical Password Scheme using Persuasive Cued Click Points
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5
Abstract
Despite the ubiquity of password systems, knowledge-based authentication mechanism remains an important and active research area. Many current systems have low level security, and even then users often devise insecure coping strategies in order to compensate for memorability and usability problems. Alternatives such as tokens or biometrics raise other issues such as privacy and loss. Various graphical password mechanisms have received considerable attention in response. A systematic review of the literature on graphical passwords shows no consistency in the usability and security evaluation of various schemes. The situation is similar for text passwords, making fair comparison between methods nearly impossible. This paper presents a graphical password scheme using persuasive cued click points. This method is based on knowledge based authentication.
Authors and Affiliations
Moulisai Rachagundla, Syed Gouse
Methods of Research into Privacy in Housing
Abstract: Systematic research through residents' attitudes, preferences, etc. in dwellings has become the dominant mode of environmental research into building design. Most of these works have been directed at the...
Buckling Analysis of Cold Formed Steel Compression Members at Elevated Temperatures
Cold-formed steel members have been widely used in residential, industrial and commercial buildings as primary load bearing structural elements due to their advantages such as higher strength to weight ratio ov...
Heat Ventilation & Air- Conditioning System with Self-Tuning Fuzzy PI Controller
In this paper, a Self-tuning Fuzzy PI controller is used for the supply air pressure Control loop for Heating, Ventilation and Air-Conditioning (HVAC) system. The modern H. V. A. Cussing direct digital control metho...
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Abstract: Cloud Computing is a subscription based service where you can obtain the networked storage space andcomputer resources. In cloud computing model, the customers plug into the cloud to access IT resources w...
A Technology Review of Electricity Generation from Nuclear Fusion Reaction in Future
In this review paper, we have tried to revisit the basic concept of nuclear fusion and the recent thrust that has been witnessed in the recent times towards power generation from it . In fusion we get the energy when two...