skip to main content
10.1145/1599301.1599342acmconferencesArticle/Chapter ViewAbstractPublication PagessiggraphConference Proceedingsconference-collections
research-article

A random cursor matrix to hide graphical password input

Published: 03 August 2009 Publication History

Abstract

Graphical passwords [Suo et al. 2005] address vital problems of textual passwords: Users pick from a limited vocabulary; machine-generated passwords are hard to memorize. Graphical input, however, faces "shoulder surfing," as bystanders can watch the screen. Current solutions to this problem tend to impose high cognitive loads. We propose an easy-to-handle approach.

Reference

[1]
Suo, X., Zhu, Y., and Owen, G. S. 2005. Graphical passwords: A survey. In Proc. ACSAC '05, 463--472.

Cited By

View all
  • (2017)Discovering Trends for the Development of Novel Authentication Applications for Dementia PatientsInternational Conference on Applications and Techniques in Cyber Security and Intelligence10.1007/978-3-319-67071-3_29(220-237)Online publication date: 21-Oct-2017
  • (2015)CashtagsProceedings of the 24th USENIX Conference on Security Symposium10.5555/2831143.2831204(961-976)Online publication date: 12-Aug-2015
  • (2015)Servers Voice Graphical Authentication2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)10.1109/FSKD.2015.7382363(2582-2586)Online publication date: Aug-2015
  • Show More Cited By

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGGRAPH '09: SIGGRAPH '09: Posters
August 2009
103 pages
ISBN:9781450379281
DOI:10.1145/1599301
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 August 2009

Check for updates

Qualifiers

  • Research-article

Conference

SIGGRAPH09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,822 of 8,601 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Discovering Trends for the Development of Novel Authentication Applications for Dementia PatientsInternational Conference on Applications and Techniques in Cyber Security and Intelligence10.1007/978-3-319-67071-3_29(220-237)Online publication date: 21-Oct-2017
  • (2015)CashtagsProceedings of the 24th USENIX Conference on Security Symposium10.5555/2831143.2831204(961-976)Online publication date: 12-Aug-2015
  • (2015)Servers Voice Graphical Authentication2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)10.1109/FSKD.2015.7382363(2582-2586)Online publication date: Aug-2015
  • (2014)Shoulder-surfing-proof graphical password authentication schemeInternational Journal of Information Security10.1007/s10207-013-0216-713:3(245-254)Online publication date: 1-Jun-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media