Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] Shraddha S.Banne, Prof. K.N.Shedge,â€A Review Graphical password Based Authentication Schemeâ€,International Journal of Science & Research(IJSR), Volume 3 Issue 10, October 2014. [2] Shraddha S.Banne, Prof. K.N.Shedge,†A Novel Graphical Password Based Authentication Method Using CAPTCHAâ€, International Journal of Informative & Futuristic Research (IJIFR), Volume 2 Issue 11 July 2015 [3] Bin B. Zhu, Je Yan, Guanbo Bao, Maowei Yang, and Ning Xu,``Captcha as a Graphical Passwords A New Security Primitive Based on Hard AI Problems",IEEE Trans, Vol. 9, No. 6, pp 891- 904, June 2014. [4] S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, ``Inuencing users towards better passwords: Persuasive cued clickpoints", in Proc. HCI, British Computer Society, Liverpool, U.K., pp 121-130, 2008. [5] S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, ``User interface design affects security: Patterns in click-based graphical passwords", Int. J. Inf. Security, vol. 8, no. 6, pp. 387- 398, 2009. [6] G. Blonder, Graphical Passwords, U.S. Patent 5559961, 1996. [7] Xiaoyuan Suo, Ying Zhu, G. Scott. Owen, “Graphical Passwords: A Surveyâ€, Department of Computer Science Georgia State University. [8] A. Dirik, N. Memon, and J.-C. Birget, “Modeling User choice in the Pass-Points graphical password scheme", in 3rd Symp. Usable Privacy and Security(SOUPS), Pittsburgh, PA, pp. 20-28, 2007. [9] Chippy. T and R. Nagendran, Defences Against Large Scale Online Password Guessing Attacks By Using Persuasive Click Points, International Journal of Communications and Engineering, Volume 03 No.3, Issue: 01 March2012 . [10] D. Davis, F. Monrose, and M. K. Reiter, “On user choice in graphical pass-word schemes", in Proc. 13th USENIX Security Symp., San Diego, CA, pp. 151-164, 2004. [11] Robert Biddle, Sonia Chiasson and P.C.van Oorschot. Graphical Passwords: Learning from the First Twelve Year. School of Computer Science, Carleton University, Jan 4, 2012. [12] Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin, “Against Spyware Using CAPTCHA in Graphical Password Scheme†[13] Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford, “CAPTCHA: Using Hard AI Problems For Security†[14] S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, ``PassPoints: Design and longitudinal evaluation of a graphical password system'', International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), 63 (2005) 102-127. [15] Xiaoyuan, S., Z. Ying, et al. (2005). “Graphical passwords: a surveyâ€, Computer Security Applications Conference, 21st Annual. [16] H. Gao, X. Liu, S.Wang, and R. Dai, “A new graphical password scheme against spyware by using CAPTCHA,†in Proc. Symp. Usable Privacy Security, 2009, pp. 760–767. [17] M. Alsaleh, M. Mannan, and P. C. van Oorschot, “Revisiting defenses against large-scale online password guessing attacks,†IEEE Trans. Dependable Secure Comput., vol. 9, no. 1, pp. 128– 141, Jan./Feb. 2012.
![]() | V2I1282.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|