An Algorithm for Color-Based Password Authentication to Increase Security Level
Abstract
Full Text:
PDF (15-22)References
Lal, N. A., Prasad, S., and Farik, M., “A Review of Authentication Methods”, International Journal of Scientific & Technology Research, vol. 5, no. 11, pp. 246-249, 2016.
Awan, K. A., Ud Din, I., Almogren, A., Kumar, N., and Almogren, A., “A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things”, ACM Transactions on Internet Technology (TOIT), vol. 22, no. 2, pp. 1-28, 2021.
Gould, E. M, “Authentication Methods and Recent Developments”, Serials Review, vol. 44, no. 3, pp. 247-250, 2018.
Zimmermann, V., and Gerber, N., “The Password Is Dead, Long Live the Password–A Laboratory Study on User Perceptions of Authentication Schemes”, International Journal of Human-Computer Studies, vol. 133, no. 1, pp. 26-44, 2020.
Spafford, E. H., “Observations on Reusable Password Choices”, in Purdue Technical Report, no. 92-049, pp. 1-14, 1992.
Wang, C., Jan, S. T., Hu, H., Bossart, D., and Wang, G., “The Next Domino to Fall: Empirical Analysis of User Passwords Across Online Services”, in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (CODASPY ’18), USA, pp. 196-203, 2018.
Pearman, S., Zhang, S. A., Bauer, L., Christin, N., and Cranor, L. F, “Why People (Don't) Use Password Managers Effectively”, in Proceedings of the Fifteenth Symposium on Usable Privacy and Security, Canada, pp. 319-338, 2019.
Alomari, R., and Thorpe, J., “On Password Behaviours and Attitudes in Different Populations”, Journal of Information Security and Applications, vol. 45, pp. 79-89, 2019.
O'Rourke, M., “The Year's Worst Password Offenders”, Risk Management, vol. 66, no. 1, pp. 36-36, 2019.
Dashline, “It’s the Most Unsecure Time of the Year: Worst Password Offenders 2021”, December 14, 2021.
Elizabeth Stobert and Robert Biddle, “The Password Life Cycle”, ACM Transactions on Security and Privacy, vol. 21, no. 3, Article 13, pp. 1-32, 2018.
He, D., Zhou, B., Yu, H., Cheng, Y., Chan, S., Zhang, M., and Guizani, N., “Group-Based Password Characteristics Analysis”, IEEE Network, vol. 35, no. 1, pp. 311-317, 2020.
Taha, M. S., Rahim, M. S. M., Lafta, S. A., Hashim, M. M., and Alzuabidi, H. M, “Combination of Steganography and Cryptography: A Short Survey”, in Proceeding of IOP Conference Series: Materials Science And Engineering, vol. 518, no. 5, pp. 1-14, 2019.
Deepthi, D. V. V., Benny, B. H., and Sreenu, K., “Various Ciphers in Classical Cryptography”, Journal of Physics, vol. 1228, no. 1, pp. 1-7, 2019.
Aung, T. M., Naing, H. H., and Hla, N. N., “A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher)”, International Journal of Machine Learning and Computing, vol. 9, no. 3, pp. 296-303, 2019.
Rachmawati, D., Hardi, S. M., and Pasaribu, R. P., “Combination of Columnar Transposition Cipher Caesar Cipher and Lempel Ziv Welch Algorithm in Image Security and Compression”, Journal of Physics, vol. 1339, no. 1, pp. 1-7, 2019.
Rihartanto, R., Supriadi, S., and Utomo, D. S. B., “Image Tiling Using Columnar Transposition”, in Proceeding of International Conference on Applied Information Technology and Innovation (ICAITI), Indonesia, pp. 118-123, 2018.
Kikani, R. J., Verma, K., Navalakhe, R., Shrivastava, G., and Shrivastava, V., “Cryptography: Recent Research Trends of Encrypting Mathematics”, Materials Today: Proceedings, vol. 56, no. 6, pp. 3247-7853, 2022.
Jagetiya, A., and Krishna, C. R., “Evolution of Information Security Algorithms”, In Design and Analysis of Security Protocol for Communication, pp. 29-77, 2020.
Santos, A., and Júnior, R. V., “Improving Caesar Cipher for Greater Security”, Kriativ-Tech, vol. 1, no. 9, pp. 1-7, 2021.
Singh, K., Johari, R., Singh, K., and Tyagi, H., “Mercurial Cipher: A New Cipher Technique and Comparative Analysis with Classical Cipher Techniques”, in Proceedings of IEEE International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), India, pp. 223-228, 2019.
Fadlan, M., Haryansyah, and Rosmini, “Three Layer Encryption Protocol: An Approach of Super Encryption Algorithm”, in Proceedings of the 3rd IEEE International Conference on Cybernetics and Intelligent System (ICORIS), pp. 1-5, 2021.
Dooley, J. F., “The Machines Take Over: Computer Cryptography”, In History of Cryptography and Cryptanalysis, Springer, pp. 167-184, 2018.
Zodpe, H., and Shaikh, A., “A Survey on Various Cryptanalytic Attacks on the AES Algorithm”, International Journal of Next-Generation Computing, vol. 12, no. 2, pp. 115-123, 2021.
Nyarko-Boateng, O., Asante, M., and Nti, I. K., “Implementation of Advanced Encryption Standard Algorithm With Key Length of 256 Bits for Preventing Data Loss in An Organization”, International Journal of Science and Engineering Applications, vol. 6, no. 3, pp. 88-94, 2017.
Refbacks
- There are currently no refbacks.