Identifying the Re-usability of Triangle Scheme and Intersection Scheme on Mobile Device
- Lim Kah Seng
- Norafida Ithnin
- Hazinah Kutty Mammi
Abstract
Graphical passwords are vulnerable to shoulder surfing attacks as the images are easier to remember than the text. Thus, existing graphical password schemes incorporate an anti-shoulder surfing mechanism, to ensure the graphical password is secure from shoulder surfing attacks. Unfortunately, the literature review has shown that most of the graphical password schemes that have anti-shoulder surfing mechanisms are general device graphical password schemes, not mobile device graphical password schemes. Therefore, in this experiment, two general device graphical password anti-shoulder surfing mechanisms, which are the Triangle Scheme and the Intersection Scheme, are reconstructed on a mobile device to test whether or not the general device graphical password anti-shoulder surfing mechanism is suitable for re-use in mobile devices.- Full Text: PDF
- DOI:10.5539/cis.v4n4p109
This work is licensed under a Creative Commons Attribution 4.0 License.
Journal Metrics
WJCI (2022): 0.636
Impact Factor 2022 (by WJCI): 0.419
h-index (January 2024): 43
i10-index (January 2024): 193
h5-index (January 2024): N/A
h5-median(January 2024): N/A
( The data was calculated based on Google Scholar Citations. Click Here to Learn More. )
Index
- Academic Journals Database
- BASE (Bielefeld Academic Search Engine)
- CiteFactor
- CNKI Scholar
- COPAC
- CrossRef
- DBLP (2008-2019)
- EBSCOhost
- EuroPub Database
- Excellence in Research for Australia (ERA)
- Genamics JournalSeek
- Google Scholar
- Harvard Library
- Infotrieve
- LOCKSS
- Mendeley
- PKP Open Archives Harvester
- Publons
- ResearchGate
- Scilit
- SHERPA/RoMEO
- Standard Periodical Directory
- The Index of Information Systems Journals
- The Keepers Registry
- UCR Library
- Universe Digital Library
- WJCI Report
- WorldCat
Contact
- Chris LeeEditorial Assistant
- cis@ccsenet.org