期刊文献+

基于多分辨离散模型的图形密码 被引量:1

Graphical passwords based on multi-resolution discretization model
下载PDF
导出
摘要 为了增强点击型图形密码在触摸屏移动智能终端应用中的易用性和安全性,离散化过程中引入多分辨思想,提出了一种用于图形密码的多分辨离散模型。对比分析数据表明,多分辨离散模型可以在相同的图像尺寸和容错距离情况下,获得比已有离散化方法更大的密码空间,增加攻击难度,提高安全性。同时多分辨离散模型可调整安全强度,可通过扩大容错距离来提高易用性。 In order to enhance the utility and security of the Click-based graphical passwords which apply in touch-screen mobile terminal. By introducing the multi-resolution into dscretization process, a multi-resolution discretization model for graphical password is proposed. Comparative analysis of the data show that the multi-resolution model obtains larger password space than existed discretization approaches at the same image size and fault-tolerant distance, so it can increase the difficulty of attack and improve security. Meanwhile, the multi-resolution model can adjust the level of security, enhance the utility by expanding fault- tolerance distance.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第12期4493-4496,共4页 Computer Engineering and Design
基金 浙江省自然科学基金项目(Y1110781)
关键词 图形密码 点击型图形密码 密码空间 多分辨离散模型 容错距离 graphical passwords click-based graphical passwords password space multi-resolution discretization model fault- tolerance distance
  • 相关文献

参考文献11

  • 1Suo X,Zhu Y, Owen G S. Graphical passwords: A survey[C]. Tucson: In 21st Annual Computer Security ApplicationsConference, 2005: 463-472. 被引量:1
  • 2Chiasson S,Biddle R,Van Oorschot P C. A second look atthe usability of click-based graphical passwords [C]. Pitts-burgh: Proceedings of the 3rd Symposium on Usable Privacyand Security, 2007 : 1-12. 被引量:1
  • 3Chiasson S,Van Oorschot P C, Biddle R Graphical password au-thentication using cued click-points [C]. Dresden: 12th EuropeanSymposium on Research in Computer Security, 2007 : 359-374. 被引量:1
  • 4Birget J C, Hong D, Memon N. Graphical passwords based onrobust discretization [J]. IEEE Transactions on InformationForensics and Security, 2006,1 (3) : 395-399. 被引量:1
  • 5Wiedenbeck S, Birget J C,Brodskiy A,et al. Authenticationusing graphical passwords : effects of tolerance and image choice[C]. Pittsburgh: Proceedings of the Symposium on Usable Pri-vacy and Security, 2005 : 1-12. 被引量:1
  • 6Wiedenbeck S, Waters J, Birget J C,et al. PassPoints: De-sign and longitudinal evaluation of a graphical password system[J]. International Journal of Human-Computer Studies, 2005,63: 102-127. 被引量:1
  • 7Chiasson S,Srinivasan J, Biddle R, etal. Centered discretiza-tion with application to graphical passwords [C]. San Francis-co: Proceedings of the 1st Conference on Usability, Psycho-logy, and Security, 2008. 被引量:1
  • 8胡卫,吴晓平,张昌宏,廖巍.图形密码身份认证方案设计及其安全性分析[J].计算机工程与设计,2009,30(14):3284-3287. 被引量:7
  • 9Elizabeth S. Usability and strength in click-based graphicalpasswords [C]. Atlanta: Proceedings of the 28th of the Inter-national Conference Extended Abstracts on Human Factors inComputing Systems, 2010. 被引量:1
  • 10Kim S H, Kim J W, Kim S Y, etal. A new shoulder-surfingresistant password for mobile environments [C]. New York:Proceedings of the 5th International Conference on UbiquitousInformation Management and Communication, 2011. 被引量:1

二级参考文献29

  • 1杨振羽,郑文庭,彭群生.一般点模型的交互式布尔运算[J].计算机辅助设计与图形学学报,2005,17(5):954-961. 被引量:5
  • 2Suo X,Zhu Y,Owen.O S.Graphical passwords:A survey[C].21st Annual Computer Security Applications Conference (ACSAC'05),2005:463-472. 被引量:1
  • 3Sobrado L,Birget J C.Graphical passwords[J].An Electronic Bulletin for Undergraduate Research,2002(4):19-23. 被引量:1
  • 4Birget J C,Hong D,Memon N.Graphical passwords based on robust discretization[C].IEEE Transactions on Information Forensics and Security,2006:395-399. 被引量:1
  • 5Perrig A,Song D.Hash visualization:A new technique to improve real-world security[C].Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce,1999:35-39. 被引量:1
  • 6RealUser[EB/OL].http://www.realuser.com,2007-11-01. 被引量:1
  • 7Jermyn I,Mayer A,Monrose F,et al.The design and analysis of graphical passwords[C].Proc Symposium,1999:13-16. 被引量:1
  • 8Thorpe J,Oorschot P C.Graphical dictionaries and the memoruble space of graphical passwords[C].San Deign:Proceedings of the 13th USENIX Security Symposium.USA:USENIX,2004:66-70. 被引量:1
  • 9Wiedenbe.ck S,Waters J,Birget J C,et al.Authentication using graphical passwords:Effects of tolerance and image choice[C].Symposium on Usable Privacy and Security(SOUPS).USA:Pittsburgh,2005:103-107. 被引量:1
  • 10Sonia Chiasson,RoBert Biddle,van Oorschot P C.A second look at the usability of click-based graphical passwords[C].Symposium On Usable Privacy and Security(SOUPS).USA:Pittsburgh,2007:18-20. 被引量:1

共引文献10

同被引文献11

  • 1Meng Yuxin. Designing click-draw based graphical password scheme for better authentication[ C ]//2012 IEEE 7th interna- tional conference on networking, architecture and storage. Xia- men : IEEE ,2012:39-48. 被引量:1
  • 2Wang Liming. Against spyware using CAPTCHA in graphical password scheme[ C]//Proc of 2010 24th IEEE international conference on advanced information networking and applica- tions. Is. 1. ] :IEEE,2010. 被引量:1
  • 3Biddle R, Chiasson S, van Oorschot P C. Graphical passwords: learning from the first twelve years[ J]. ACM Computing Sur-veys,2012,44(4) : 1-41. 被引量:1
  • 4Biddle R, Mannan M, van Oorschot P C, et al. User study anal- ysis and usable security of passwords based on digital objects [ J]. IEEE Transactions on Information Forensics and Securi- ty ,2011,6 (3) :970-979. 被引量:1
  • 5Chang Tingyi, Tsai Cheng-Jung, Lin Jyun - Hao. A graphical- based password keystroke dynamic authentication system for touch screen handheld mobile devices [ J ]. Journal of Systems and Software,2012,85 ( 5 ) : 1157-1165. 被引量:1
  • 6Cheong Soon-Nyean,Ling Huo-Chong,Teh Pei-Lee. Secure encrypted steganography graphical password scheme for near field communication smartphone access control system [ J ]. Expert Systems with Applications ,2014,41 (7) :3561-3568. 被引量:1
  • 7Wu Tzong-Sun, Lee Ming-Lun, Lin Hanyu, et al. Shoulder- surfing-proof graphical password authentication scheme [ J ]. International Journal of Information Security ,2014,13 ( 3 ) :245 -254. 被引量:1
  • 8Chinasson S,Stobert E,Foret A,et al. Persusive cued click- points : design, implementation and evaluation of a knowledge- based authentication mechanism [ J ]. IEEE Transactions on Dependable and Secure Computing,2012,9(2) :222-235. 被引量:1
  • 9蔡伟俊,杜晓荣,万里.推理型图形密码认证系统的设计与实现[J].计算机工程与设计,2010,31(12):2687-2690. 被引量:1
  • 10胡卫,马常楼,廖巍.图形密码方案可用性及安全性分析[J].计算机应用与软件,2010,27(12):55-57. 被引量:6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部