dc.date.accessioned2019-01-29T22:19:56Z
dc.date.accessioned2023-05-30T23:27:53Z
dc.date.available2019-01-29T22:19:56Z
dc.date.available2023-05-30T23:27:53Z
dc.date.created2019-01-29T22:19:56Z
dc.date.issued2008
dc.identifierurn:isbn:9781604232356
dc.identifierhttp://repositorio.ucsp.edu.pe/handle/UCSP/15905
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/6477717
dc.description.abstractPassword Identification or Weak Authentication is one of the weakest points in accessing a system and a suitable point for recurrent attacks of crackers or sniffers. Breakdowns ranging from dictionary brute force attacks to password guesses have shown the increasing need for new types of identification forms based not only on characters' combination, but also taking into account the inherent advantages of the so-called Graphical Passwords. Using graph coloring for a password based system has always been an interesting proposal, but one of its main drawbacks was to teach the user some basic concepts of Graph Theory and also some Graph Coloring Algorithms. The following research tries to establish the usefulness of using password identification with graph coloring applied to graphical passwords, so that a common user could take advantage of this technique in a simplistic manner.
dc.languageeng
dc.publisherScopus
dc.relationhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84883332380&partnerID=40&md5=c90653769b08d88e708e3f240c657e86
dc.rightsinfo:eu-repo/semantics/restrictedAccess
dc.sourceRepositorio Institucional - UCSP
dc.sourceUniversidad Católica San Pablo
dc.sourceScopus
dc.subjectBasic concepts
dc.subjectBrute-force attack
dc.subjectGraph colorings
dc.subjectGraphical password
dc.subjectPassword-based systems
dc.subjectComputer applications
dc.subjectGraph theory
dc.subjectAuthentication
dc.titleGraph coloring for enforcing password identification against brute force attacks
dc.typeinfo:eu-repo/semantics/conferenceObject


Este ítem pertenece a la siguiente institución