Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Graphical Password authentication

biblio

Visible to the public Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication

Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
  • alphanumeric password system
  • twofish encryption and visual cryptography method
  • Twofish encryption
  • two factor authentication
  • TEVC method
  • TEVC encryption algorithm
  • password protections
  • message code confirmation
  • Java platform
  • Graphical Password authentication
  • Graphical Password
  • fingerprint scan
  • dual authentication process
  • authentication method
  • authorisation
  • secure authentication
  • data communication
  • Human Factors
  • data visualisation
  • computational complexity
  • encryption
  • visual cryptography
  • Java
  • message authentication
  • Data protection
  • internet
  • pubcrawl
  • Cryptography
biblio

Visible to the public A Graphical Password Authentication for analyzing legitimate user in online social network and secure social image repository with metadata

Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
  • meta data
  • uploaded images
  • social networking (online)
  • Social network services
  • Security Policies Analysis
  • secure social image repository
  • pubcrawl
  • privacy
  • policy-based governance
  • online social network
  • multimedia information sharing
  • metadata
  • Meta Data Stratification
  • alphanumeric textbased password
  • legitimate user
  • internet
  • hassle-free privacy setting
  • Graphical Password authentication
  • flaw points
  • Databases
  • data privacy
  • Computer hacking
  • collaboration
  • automatic policy prediction
  • authorisation
  • authentication

Terms of Use  |  ©2023. CPS-VO