Picture Password(A Visual Login Technique for Mobile Devices )
#1

Presented by:
K.M.DINESH

[attachment=10478]
ABSTRACT
Adequate user authentication is a persistent problem, particularly with handheld devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk, not only by containing sensitive information, but also by providing the means to access such information over wireless network interfaces. User authentication is the first line of defense for a lost or stolen PDA. However, motivating users to enable simple PIN or password mechanisms and periodically update their authentication information is a constant struggle.
This paper describes a general-purpose mechanism for authenticating a user to a PDA using a visual login technique called Picture Password. The underlying rationale is that image recall is an easy and natural way for users to authenticate, removing a serious barrier to compliance with organizational policy. Features of Picture Password include style dependent image selection, password reuse, and embedded salting, which overcome a number of problems with knowledge-based authentication for handheld devices. Though designed specifically for handheld devices, Picture Password is also suitable for notebooks, workstations, and other computational devices.

Reply
#2
Thumbs Up 

can i get the full documentation on this topic
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ffcs student login, cie training login**dnesday weekly lottery result, dmrc payslip login** a new privacy measure for data publishing, fundoodata com login details, fadduengineers login, t2 picture competition, nha atschool login,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  3D Password seminar surveyer 16 13,134 30-08-2014, 02:55 AM
Last Post: nadir.zeeshan25
  CROSS LAYER TECHNIQUE FULL REPORT seminar class 1 3,314 27-01-2013, 10:46 PM
Last Post: Guest
  Mobile Virtual Reality Service (VRS) computer science crazy 13 15,088 29-12-2012, 11:24 AM
Last Post: seminar details
  Visual security is feeble for anti-phishing seminar surveyer 5 4,336 18-10-2012, 01:15 PM
Last Post: seminar details
  3d face recognition in mobile phone dafy 3 3,300 01-02-2012, 10:40 AM
Last Post: seminar addict
  SECURE COGNITIVE MOBILE HOTSPOT seminar class 2 3,044 08-08-2011, 09:54 AM
Last Post: seminar addict
  NEXT GENERATION OF WINDOWS MOBILE seminar class 0 2,107 04-04-2011, 09:24 AM
Last Post: seminar class
  MOBILE WEB BROWSER seminar class 0 2,389 30-03-2011, 02:29 PM
Last Post: seminar class
  Intel Centrino Mobile Technology computer science crazy 2 3,241 25-03-2011, 06:22 PM
Last Post: [email protected]
  Routing protocols in Mobile Ad Hoc Network seminar surveyer 1 2,458 10-03-2011, 10:08 AM
Last Post: seminar class

Forum Jump: