Skip to main content

GRAF Password for More Secured User Authentication

  • Conference paper
  • 2816 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 361))

Abstract

There are many authentication schemes in the current state. Some of them are based on user’s physical and behavioral properties, and some other authentication schemes are based on user’s knowledge such as textual and graphical passwords. Moreover, there are some other important authentication schemes that are based on what you have, such as smart cards. GRAF password is an authentication scheme based on virtual environment by adding it as a response to actions performed on an object. Therefore, the resulted password space becomes very large compared to any existing authentication schemes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Klein, D.V.: Foiling the cracker: A survey of, and improvement to passwords security. In: Proc. USENIX Security Workshop, pp. 5–14 (1990)

    Google Scholar 

  2. Dhamija, R., Perrig, A.: Déjà Vu: A user study using images for authentication. In: Proc. 9th USINEX Security Symp., Denver, CO, pp. 45–58 (August 2000)

    Google Scholar 

  3. Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: PassPoints: Design and longitudinal evaluation of a graphical password system. Int. J. Human-Comput. Stud. (Special Issue on HCI Research in Privacy and Security) 63(1/2), 102–127 (2005)

    Google Scholar 

  4. Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The Design and Analysis of Graphical Passwords. In: Proceedings of the 8th USENIX Security Symposium (1999)

    Google Scholar 

  5. Chiasson, S., van Oorschot, P.C., Biddle, R.: Graphical Password Authentication Using Cued Click Points. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 359–374. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Real User Corporation, The Science Behind Passfaces (October 2005), http://www.realusers.com

  7. Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: A survey. In: Proc. 21st Annu. Comput. Security Appl. Conf., December 5-9, pp. 463–472 (2005)

    Google Scholar 

  8. Alsulaiman, F.A., El Saddik, A.: Three-Dimensional Password for More Secure Authentication. In: Proc. IEEE Transactions on Instrumentation and Measurement (September 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Temkar, R., Shejy, G., Jagli, D. (2013). GRAF Password for More Secured User Authentication. In: Unnikrishnan, S., Surve, S., Bhoir, D. (eds) Advances in Computing, Communication, and Control. ICAC3 2013. Communications in Computer and Information Science, vol 361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36321-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36321-4_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36320-7

  • Online ISBN: 978-3-642-36321-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics