期刊文献+

一种新的识别型图形口令认证方案 被引量:1

A new authentication scheme using identified graphical password
下载PDF
导出
摘要 身份认证是信息安全理论与技术的重要组成部分,图形口令在密钥空间、易记性、防肩窥性等方面均优于目前广泛使用的文本口令.在分析图形口令技术现状基础上,结合其验证过程,提出了一种新的识别型的图形口令方案,该方案要求用户在注册时从显示的图片中选择口令图片并记下若干图片的先后顺序,登录时只需要按顺序识别出部分口令图片即可.注册和登录时图片均随机显示.经实验,该方案具有较高的安全性和可用性,并能有效地防止肩窥攻击. Identity authentication is an important part of information security theory and technology. Graphical password is superior to text password which is widely used in many aspects such as key space, memorability and ability of preventing shoulder surfing.Based on analyzing technique status of graphical password,this paper,combing verification process,puts forward a new authentication scheme using i_dentified graphical password.In this scheme,users are required to choose several pictures as passwords and memorize the sequence in registration,and when logging in,they only have to identify some of them in order.All the pictures are displayed randomly.Experimental results show that this scheme has fairly high security and usability,which can prevent shoulder surfing effectively.
作者 段珊珊
出处 《江苏建筑职业技术学院学报》 2014年第4期22-25,共4页 Journal Of Jiangsu Vocational Institute of Architectural Technology
关键词 信息安全 身份认证 识别型图形口令 方案 肩窥攻击 information security identity authentication identified graphical password scheme shulder surfing attack
  • 相关文献

参考文献5

  • 1尹长青,葛轶旻,刘岩.一种新的可视化图形口令[J].计算机工程与设计,2007,28(4):911-913. 被引量:2
  • 2Hong D, Man S, Hawes B,et al. A password scheme strongly resistant to spyware[C]. Proceedings of In- ternational conference on security and management. Las Vergas, NV, 2004.
  • 3梁钰敏.基于图形口令的认证系统[D].徐州:中国矿业大学,2011:11-14.
  • 4Suo X Y, Zhu Y, Owen G S. Analysis and Design of Graphical Password Techniques[J]. Lecture notes in computer science. 2006,4292 : 741 - 749.
  • 5胡卫,马常楼,廖巍.图形密码方案可用性及安全性分析[J].计算机应用与软件,2010,27(12):55-57. 被引量:6

二级参考文献23

  • 1Goldberg J,Hagman J,Sazawal V.Doodling Our Way to Better Authentication[C]//Proceedings of Human Factors in Computing Systems (CHI),Minneapolis,Minnesota,USA,2002.
  • 2Syukri A F,Okamoto E,Mambo M.A User Identification System Using Signature Written with Mouse[C]//Third Australasian Conference on Information Security and Privacy (ACISP):Springer-Verlag Lecture Notes in Computer Science (1438),1998:403-441.
  • 3Wiedenbeck S,Waters J,Birget J C,et al.Authentication using graphical passwords:Effects of tolerance and image choice[C]//Symposium on Usable Privacy and Security (SOUPS).Carnegie-Mellon University,Pittsburgh,2005.
  • 4Suo X,Zhu Y,Owen GS.Graphical passwords:A survey.21 st Annual Computer Security Applications Conference (ACSAC'05),2005:463-472.
  • 5Birget J C,Hong D,Memon N.Graphical Passwords Based on Robust Discretization[J].IEEE Transactions on Information Forensics and Security,2006,1(3):395-399.
  • 6Sonia Chiasson,RoBert Biddle,Oorschot P C van.A Second Look at the Usability of Click-Based Graphical Passwords[C]//Symposium On Usable Privacy and Security (SOUPS) 2007,Pittsburgh,PA,USA,2007:18-20.
  • 7Nali D,Thorpe J.Analyzing User Choice in Graphical Passwords[R].Technical Report,School of Information Technology and Engineering,University of Ottawa,Canada May,2004,27.
  • 8Perrig A,Song D.Hash Visualization:A New Technique to Improve Real-World Security[C]//In Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce,1999.
  • 9Sobrado L,Birget J C.Graphical passwords[C]//The Rutgers Scholar,An Electronic Bulletin for Undergraduate Research,2002,4.
  • 10Hong D,Man S,Hawes B,et al.A password scheme strongly resistant to spyware[C]//Proceedings of International conference on security and management.Las Vergas,NV,2004.

共引文献6

同被引文献10

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部