期刊文献+

树与单圈图优雅标号算法的新型图形密码研究 被引量:1

New Type of Graphical Password Study Based on the Elegant Label Algorithm of Tree and Unicyclic Graph
下载PDF
导出
摘要 为解决传统身份验证方法中密码易记忆性与安全性问题,文中提出了一种针对树图与单圈图的优雅标号算法,并将其应用于构建基于优雅标号的新型图形密码。该算法把图结构和数论相结合,递归遍历指定优雅解空间,直到对应邻接矩阵满足优雅目标函数或对应优雅空间遍历完成时结束。文中给出了算法设计步骤,并进行了算法测试分析。结果表明,16个点范围内所有树图与单圈图几乎都是优雅的,只有个别图是非优雅的。据此得到2个定理和一个猜想,为构建基于优雅标号的新型图形密码提供了基础数据。 In order to solve the problem of easy memory and security of passwords in traditional authentication methods,an elegant labeling algorithm for tree and unicyclic graphs was proposed,which was further used to construct a new type of graphical password based on elegant labeling.The algorithm combined graph structure and number theory,iteratively traversed the specified elegant solution space until the corresponding adjacency matrix satisfied the elegant objective function or finished when the corresponding elegant space traversal was completed.This paper presented the algorithm design steps and carried out the algorithm test and analysis.The results showed that almost all the tree and unicyclic graphs within the 16-point range were elegant.Only some of the graphs were non-elegant.According to the results,two theorems and one conjecture were obtained,which provided a basic data set based on elegant labeling for the new graphical password.
作者 黄泽 HUANG Ze(School of Electronic and Information Engineering,Lanzhou Jiaotong University,Lanzhou 730070,China)
出处 《电子科技》 2019年第3期77-81,共5页 Electronic Science and Technology
基金 国家自然科学基金(11461038 61163010)~~
关键词 图形密码 树与单圈图 优雅图 优雅标号 非优雅图 优雅标号算法 graphical password tree and unicyclic graphs elegant graph elegant labeling non-elegant graph algorithm of elegant labeling
  • 相关文献

参考文献3

二级参考文献22

  • 1李波,王祥凤,曹福毅.一种针对低质量指纹的指纹图像匹配算法[J].安防科技,2010(3):8-11. 被引量:1
  • 2苑玮琦,李宏伟.基于指纹结构特征信息匹配的算法[J].光电工程,2006,33(7):101-104. 被引量:6
  • 3Suo X,Zhu Y,Owen.O S.Graphical passwords:A survey[C].21st Annual Computer Security Applications Conference (ACSAC'05),2005:463-472.
  • 4Sobrado L,Birget J C.Graphical passwords[J].An Electronic Bulletin for Undergraduate Research,2002(4):19-23.
  • 5Birget J C,Hong D,Memon N.Graphical passwords based on robust discretization[C].IEEE Transactions on Information Forensics and Security,2006:395-399.
  • 6Perrig A,Song D.Hash visualization:A new technique to improve real-world security[C].Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce,1999:35-39.
  • 7RealUser[EB/OL].http://www.realuser.com,2007-11-01.
  • 8Jermyn I,Mayer A,Monrose F,et al.The design and analysis of graphical passwords[C].Proc Symposium,1999:13-16.
  • 9Thorpe J,Oorschot P C.Graphical dictionaries and the memoruble space of graphical passwords[C].San Deign:Proceedings of the 13th USENIX Security Symposium.USA:USENIX,2004:66-70.
  • 10Wiedenbe.ck S,Waters J,Birget J C,et al.Authentication using graphical passwords:Effects of tolerance and image choice[C].Symposium on Usable Privacy and Security(SOUPS).USA:Pittsburgh,2005:103-107.

共引文献21

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部