Tangramrine: A novel graphical recognition and cued-recall based password system

Descripción del Articulo

Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; by giving a more robust schema against brute force and shoulder-surfing attac...

Descripción completa

Detalles Bibliográficos
Autores: Altamirano, Steven, Zanellia, Jesús, Gutiérrez Cárdenas, Juan M., Bringas, Daniela
Formato: artículo
Fecha de Publicación:2015
Institución:Universidad San Ignacio de Loyola
Repositorio:USIL-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.usil.edu.pe:20.500.14005/1662
Enlace del recurso:http://dx.doi.org/10.14257/ijsia.2015.9.8.02
https://hdl.handle.net/20.500.14005/1662
Nivel de acceso:acceso abierto
Materia:Graphical Password
Authentication
Usability
Security
Memory scheme
id USIL_42f11dc19a223db789053b803951111f
oai_identifier_str oai:repositorio.usil.edu.pe:20.500.14005/1662
network_acronym_str USIL
network_name_str USIL-Institucional
repository_id_str 3128
dc.title.es.fl_str_mv Tangramrine: A novel graphical recognition and cued-recall based password system
title Tangramrine: A novel graphical recognition and cued-recall based password system
spellingShingle Tangramrine: A novel graphical recognition and cued-recall based password system
Altamirano, Steven
Graphical Password
Authentication
Usability
Security
Memory scheme
title_short Tangramrine: A novel graphical recognition and cued-recall based password system
title_full Tangramrine: A novel graphical recognition and cued-recall based password system
title_fullStr Tangramrine: A novel graphical recognition and cued-recall based password system
title_full_unstemmed Tangramrine: A novel graphical recognition and cued-recall based password system
title_sort Tangramrine: A novel graphical recognition and cued-recall based password system
author Altamirano, Steven
author_facet Altamirano, Steven
Zanellia, Jesús
Gutiérrez Cárdenas, Juan M.
Bringas, Daniela
author_role author
author2 Zanellia, Jesús
Gutiérrez Cárdenas, Juan M.
Bringas, Daniela
author2_role author
author
author
dc.contributor.author.fl_str_mv Altamirano, Steven
Zanellia, Jesús
Gutiérrez Cárdenas, Juan M.
Bringas, Daniela
dc.subject.es.fl_str_mv Graphical Password
Authentication
Usability
Security
Memory scheme
topic Graphical Password
Authentication
Usability
Security
Memory scheme
description Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; by giving a more robust schema against brute force and shoulder-surfing attacks. In this research paper we present an alternative to a graphical password based on a modification of the Tangram game. We believe our proposal accomplishes the features of being an easy recognition-based system password giving the user enough security against common threats such as brute force attacks by dictionary means or OCR types, as well as shoulder-surfing attacks.
publishDate 2015
dc.date.accessioned.none.fl_str_mv 2016-03-14T14:35:38Z
dc.date.available.none.fl_str_mv 2016-03-14T14:35:38Z
dc.date.issued.fl_str_mv 2015-08
dc.type.es.fl_str_mv info:eu-repo/semantics/article
format article
dc.identifier.citation.es.fl_str_mv Altamirano, S., Zanelli, J., Gutiérrez, J., & Bringas, D. (2015). Tangramrine: A Novel Graphical Recognition and Cued-recall based Password System. International Journal of Security and its Applications, 9(8), 15-22.
dc.identifier.issn.es.fl_str_mv 1738-9976
dc.identifier.journal.en.fl_str_mv International Journal of Security and its Applications
dc.identifier.uri.none.fl_str_mv http://dx.doi.org/10.14257/ijsia.2015.9.8.02
https://hdl.handle.net/20.500.14005/1662
identifier_str_mv Altamirano, S., Zanelli, J., Gutiérrez, J., & Bringas, D. (2015). Tangramrine: A Novel Graphical Recognition and Cued-recall based Password System. International Journal of Security and its Applications, 9(8), 15-22.
1738-9976
International Journal of Security and its Applications
url http://dx.doi.org/10.14257/ijsia.2015.9.8.02
https://hdl.handle.net/20.500.14005/1662
dc.language.iso.es.fl_str_mv eng
language eng
dc.relation.ispartof.en.fl_str_mv International Journal of Security and its Applications
dc.rights.es.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.none.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
dc.publisher.es.fl_str_mv International Journal of Security and Its Applications
dc.source.es.fl_str_mv Universidad San Ignacio de Loyola
Repositorio Institucional - USIL
dc.source.none.fl_str_mv reponame:USIL-Institucional
instname:Universidad San Ignacio de Loyola
instacron:USIL
instname_str Universidad San Ignacio de Loyola
instacron_str USIL
institution USIL
reponame_str USIL-Institucional
collection USIL-Institucional
bitstream.url.fl_str_mv https://repositorio.usil.edu.pe/bitstreams/92f7f951-f6cc-4d08-a8df-d37b9d682735/download
https://repositorio.usil.edu.pe/bitstreams/1b6daff0-6c9b-4559-8d3e-1751834290f6/download
https://repositorio.usil.edu.pe/bitstreams/1dee4616-ab02-4899-a97f-e0b50ed9ee3c/download
https://repositorio.usil.edu.pe/bitstreams/88c3670e-edc4-43e6-b349-41e8960df4bd/download
bitstream.checksum.fl_str_mv 559102ac61636c7dcaddcec8c3eaf961
8a4605be74aa9ea9d79846c1fba20a33
c5e65c91256cd35fbdd29455376aeebc
ff227975252535caab9f0656c5cd6708
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio institucional de la Universidad San Ignacio de Loyola
repository.mail.fl_str_mv repositorio.institucional@usil.edu.pe
_version_ 1790534334253367296
spelling 27d50b8d-994f-4ca6-a8d3-38e55c9a4731-1a2bb0b9e-7aa5-4193-87ab-4b617c90b3af-1ea1878b3-7bff-4c47-9ee6-f0fae9678b74-1bd228468-87bc-42e4-b5c2-6aba0a1481f0-1Altamirano, StevenZanellia, JesúsGutiérrez Cárdenas, Juan M.Bringas, Daniela2016-03-14T14:35:38Z2016-03-14T14:35:38Z2015-08Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; by giving a more robust schema against brute force and shoulder-surfing attacks. In this research paper we present an alternative to a graphical password based on a modification of the Tangram game. We believe our proposal accomplishes the features of being an easy recognition-based system password giving the user enough security against common threats such as brute force attacks by dictionary means or OCR types, as well as shoulder-surfing attacks.Altamirano, S., Zanelli, J., Gutiérrez, J., & Bringas, D. (2015). Tangramrine: A Novel Graphical Recognition and Cued-recall based Password System. International Journal of Security and its Applications, 9(8), 15-22.1738-9976International Journal of Security and its Applicationshttp://dx.doi.org/10.14257/ijsia.2015.9.8.02https://hdl.handle.net/20.500.14005/1662engInternational Journal of Security and Its ApplicationsInternational Journal of Security and its Applicationsinfo:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-nd/4.0/Universidad San Ignacio de LoyolaRepositorio Institucional - USILreponame:USIL-Institucionalinstname:Universidad San Ignacio de Loyolainstacron:USILGraphical PasswordAuthenticationUsabilitySecurityMemory schemeTangramrine: A novel graphical recognition and cued-recall based password systeminfo:eu-repo/semantics/articlePublicationORIGINAL2015_Altamirano_Tangramrine.pdf2015_Altamirano_Tangramrine.pdfapplication/pdf680498https://repositorio.usil.edu.pe/bitstreams/92f7f951-f6cc-4d08-a8df-d37b9d682735/download559102ac61636c7dcaddcec8c3eaf961MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.usil.edu.pe/bitstreams/1b6daff0-6c9b-4559-8d3e-1751834290f6/download8a4605be74aa9ea9d79846c1fba20a33MD52TEXT2015_Altamirano_Tangramrine.pdf.txt2015_Altamirano_Tangramrine.pdf.txtExtracted texttext/plain22464https://repositorio.usil.edu.pe/bitstreams/1dee4616-ab02-4899-a97f-e0b50ed9ee3c/downloadc5e65c91256cd35fbdd29455376aeebcMD53THUMBNAIL2015_Altamirano_Tangramrine.pdf.jpg2015_Altamirano_Tangramrine.pdf.jpgGenerated Thumbnailimage/jpeg14432https://repositorio.usil.edu.pe/bitstreams/88c3670e-edc4-43e6-b349-41e8960df4bd/downloadff227975252535caab9f0656c5cd6708MD5420.500.14005/1662oai:repositorio.usil.edu.pe:20.500.14005/16622023-04-17 11:00:11.019http://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccesshttps://repositorio.usil.edu.peRepositorio institucional de la Universidad San Ignacio de Loyolarepositorio.institucional@usil.edu.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
score 13.894945
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).