FakePIN: Dummy key based mobile user authentication scheme
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, S. | - |
dc.contributor.author | Yi, H. | - |
dc.contributor.author | Yi, J.H. | - |
dc.date.available | 2019-04-10T10:20:08Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2014 | - |
dc.identifier.isbn | 9783642416705 | - |
dc.identifier.issn | 1876-1100 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32782 | - |
dc.description.abstract | Recently, smartphones have been used to store and manipulate a large amount of personal information. Hence, the importance of user authentication such as password setting has increased. Previous techniques to prevent a shoulder-surfing attack have considerable advantages with respect to security because they are mostly based on graphical features. They also have shortcomings in that the length of the password has to be memorized or that authentication takes a long time; hence, their usability is less than that of a text-based password technique. In this paper, we propose a dummy-key based password authentication scheme, called FakePIN, to assure good usability as well as to prevent shoulder-surfing, guessing, and smudge attacks. © Springer-Verlag Berlin Heidelberg 2014. | - |
dc.publisher | Springer Verlag | - |
dc.relation.isPartOf | Lecture Notes in Electrical Engineering | - |
dc.title | FakePIN: Dummy key based mobile user authentication scheme | - |
dc.type | Conference | - |
dc.identifier.doi | 10.1007/978-3-642-41671-2_21 | - |
dc.type.rims | CONF | - |
dc.identifier.bibliographicCitation | 8th International Conference on Ubiquitous Information Technologies and Applications, CUTE 2013, v.280 LNEE, pp.157 - 164 | - |
dc.description.journalClass | 2 | - |
dc.identifier.scopusid | 2-s2.0-84958535674 | - |
dc.citation.conferenceDate | 2013-12-18 | - |
dc.citation.conferencePlace | Danang | - |
dc.citation.endPage | 164 | - |
dc.citation.startPage | 157 | - |
dc.citation.title | 8th International Conference on Ubiquitous Information Technologies and Applications, CUTE 2013 | - |
dc.citation.volume | 280 LNEE | - |
dc.contributor.affiliatedAuthor | Yi, J.H. | - |
dc.type.docType | Conference Paper | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.