Android Based Total Security for System Authentication

Download Now
Provided by: International Journal of Engineering Research and Applications (IJERA)
Topic: Security
Format: PDF
In this paper, a highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been introduced as an alternative to the traditional authentication process. Though the graphical password schemes provide a way of making more user friendly passwords, while increasing the level of security, they are vulnerable to shoulder surfing.
Download Now

Find By Topic