{"title":"抗肩冲浪攻击的高级图形认证技术综述","authors":"D. Thosar, Manmohan Singh","doi":"10.1109/ICACAT.2018.8933699","DOIUrl":null,"url":null,"abstract":"In today’s world of newly coming technologies, an authentication play’s an efficient role to provide authenticity to every user’s vital information from variety of system attacks. So we need to provide strong authenticity to avoid from such an unsecured problems. Up till now most of the users prefer text passwords to provide authenticity to their account. In many cases there will be a risk of textual password by selecting an irrelevant or easily remembered password or the way of putting it in the insecure way are said to be “the unsecured way” in the authentication chain. Except choosing a strong character set, the user will select the easier password which is less complicated or short or the text as a password which is easier to kept in mind. So with new & advanced, emerging technologies and a large set of mobile application to be developed on regular basis. Due to this user can access their account anytime, anywhere on mobiles, Laptops etc. It’s a better thing through which we decrease the time consumption but automatically increases the chance of exposing the credentials to the shoulder surfing attacker’s. It can be happened directly or indirectly with naked eyes or indirectly by using some hidden recording devices to detect user’sconfidential data.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"42 1","pages":"1-3"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Review on Advanced Graphical Authentication to Resist Shoulder Surfing Attack\",\"authors\":\"D. Thosar, Manmohan Singh\",\"doi\":\"10.1109/ICACAT.2018.8933699\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today’s world of newly coming technologies, an authentication play’s an efficient role to provide authenticity to every user’s vital information from variety of system attacks. So we need to provide strong authenticity to avoid from such an unsecured problems. Up till now most of the users prefer text passwords to provide authenticity to their account. In many cases there will be a risk of textual password by selecting an irrelevant or easily remembered password or the way of putting it in the insecure way are said to be “the unsecured way” in the authentication chain. Except choosing a strong character set, the user will select the easier password which is less complicated or short or the text as a password which is easier to kept in mind. So with new & advanced, emerging technologies and a large set of mobile application to be developed on regular basis. Due to this user can access their account anytime, anywhere on mobiles, Laptops etc. It’s a better thing through which we decrease the time consumption but automatically increases the chance of exposing the credentials to the shoulder surfing attacker’s. It can be happened directly or indirectly with naked eyes or indirectly by using some hidden recording devices to detect user’sconfidential data.\",\"PeriodicalId\":6575,\"journal\":{\"name\":\"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)\",\"volume\":\"42 1\",\"pages\":\"1-3\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACAT.2018.8933699\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACAT.2018.8933699","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review on Advanced Graphical Authentication to Resist Shoulder Surfing Attack
In today’s world of newly coming technologies, an authentication play’s an efficient role to provide authenticity to every user’s vital information from variety of system attacks. So we need to provide strong authenticity to avoid from such an unsecured problems. Up till now most of the users prefer text passwords to provide authenticity to their account. In many cases there will be a risk of textual password by selecting an irrelevant or easily remembered password or the way of putting it in the insecure way are said to be “the unsecured way” in the authentication chain. Except choosing a strong character set, the user will select the easier password which is less complicated or short or the text as a password which is easier to kept in mind. So with new & advanced, emerging technologies and a large set of mobile application to be developed on regular basis. Due to this user can access their account anytime, anywhere on mobiles, Laptops etc. It’s a better thing through which we decrease the time consumption but automatically increases the chance of exposing the credentials to the shoulder surfing attacker’s. It can be happened directly or indirectly with naked eyes or indirectly by using some hidden recording devices to detect user’sconfidential data.