z-logo
open-access-imgOpen Access
Identifying the Re-usability of Triangle Scheme and Intersection Scheme on Mobile Device
Author(s) -
Lim Kah Seng,
Norafida Ithnin,
Hazinah Kutty Mammi
Publication year - 2011
Publication title -
computer and information science
Language(s) - English
Resource type - Journals
eISSN - 1913-8997
pISSN - 1913-8989
DOI - 10.5539/cis.v4n4p109
Subject(s) - password , computer science , scheme (mathematics) , cognitive password , usability , intersection (aeronautics) , one time password , password strength , human–computer interaction , computer security , mathematics , mathematical analysis , engineering , aerospace engineering
Graphical passwords are vulnerable to shoulder surfing attacks as the images are easier to remember than the text. Thus, existing graphical password schemes incorporate an anti-shoulder surfing mechanism, to ensure the graphical password is secure from shoulder surfing attacks. Unfortunately, the literature review has shown that most of the graphical password schemes that have anti-shoulder surfing mechanisms are general device graphical password schemes, not mobile device graphical password schemes.  Therefore, in this experiment, two general device graphical password anti-shoulder surfing mechanisms, which are the Triangle Scheme and the Intersection Scheme, are reconstructed on a mobile device to test whether or not the general device graphical password anti-shoulder surfing mechanism is suitable for re-use in mobile devices

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom