A PROPOSAL AND IMPLEMENTATION OF THE SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD USING TWO SHIFT FUNCTIONS
Proceeding: The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec)Publication Date: 2013-03-04
Authors : Yoshihiro Kita Fumio Sugai MiRang Park Naonobu Okazaki;
Page : 54-59
Keywords : Authentication; Mobile T erminals; Shoulder-Surfing Attack;
Abstract
Recently, mobile terminals such as smartphones have come to be widely used. Most of such mobile terminals store several types of important data, such as personal information. Therefore, it is necessary to lock and unlock terminals using a personal authentication method such as personal identification numbers (PIN) in order to prevent data theft. However, most existing authentication methods have a common problem referred to as “shoulder-surfing,†which means inferring authentication information by watching the authentication sequence. In the present paper, a new icon-based authentication method is proposed that is simple but sufficiently secure even when the authentication sequence is being watched. The proposed method is implemented on a mobile data terminal and is evaluated through a series of experiments and questionnaire surveys.
Other Latest Articles
- DIGITAL VIDEO WATERMARKING ON CLOUD COMPUTING ENVIRONMENTS
- EPSILON2 VIRTUAL INFORMATION SECURITY TESTING SYSTEM MARK II
- A MULTI-SERVERS REMOTE USER AUTHENTICATION SCHEME USING A SMARTER SMART CARD
- INFORMATION SECURITY MANAGEMENT BEYOND CERTIFICATION AND ACCREDITATION
- EFFECTIVE CORPORATE GOVERNANCE: COMBINING AN ICT SECURITY INCIDENT AND ORGANISATIONAL LEARNING
Last modified: 2013-06-18 22:05:50