Reference Hub1
Graphical-Based Authentication System and Its Applications

Graphical-Based Authentication System and Its Applications

Priti Golar, Brijesh Khandelwal
Copyright: © 2021 |Pages: 29
ISBN13: 9781799867210|ISBN10: 1799867218|ISBN13 Softcover: 9781799867227|EISBN13: 9781799867234
DOI: 10.4018/978-1-7998-6721-0.ch004
Cite Chapter Cite Chapter

MLA

Golar, Priti, and Brijesh Khandelwal. "Graphical-Based Authentication System and Its Applications." Design, Applications, and Maintenance of Cyber-Physical Systems, edited by Pierluigi Rea, et al., IGI Global, 2021, pp. 63-91. https://doi.org/10.4018/978-1-7998-6721-0.ch004

APA

Golar, P. & Khandelwal, B. (2021). Graphical-Based Authentication System and Its Applications. In P. Rea, E. Ottaviano, J. Machado, & K. Antosz (Eds.), Design, Applications, and Maintenance of Cyber-Physical Systems (pp. 63-91). IGI Global. https://doi.org/10.4018/978-1-7998-6721-0.ch004

Chicago

Golar, Priti, and Brijesh Khandelwal. "Graphical-Based Authentication System and Its Applications." In Design, Applications, and Maintenance of Cyber-Physical Systems, edited by Pierluigi Rea, et al., 63-91. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-6721-0.ch004

Export Reference

Mendeley
Favorite

Abstract

Authentication systems are the protective barrier of any software. They make sure that the right people enter the system and access the right information. As per available literature, there are basically three authentication techniques. This research study is based on the knowledge-based authentication, since it is the most widely accepted technique for securing resources from unauthorized access. As an initial step, the existing knowledge-based authentication system has been studied for its highlights, comparative facts, advantages, and disadvantages. For acceptance of any secure system, the usability aspect is the first step in the authentication process. The various usability evaluation parameters of the existing systems and an approach towards developing a modified usable authentication system have been briefly discussed. An initial lab study for the proposed system was conducted to analyze the comparative results. The future scope of other dimensions, namely randomness and security, as well as a thorough investigation, has been highlighted as the research work's concluding remark.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.