Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 838623, 12 pages
Research Article

Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information

1Faculty of Computer Science and Information Technology, University of Malaya, 50603 Lembah Pantai, Kuala Lumpur, Malaysia
2Multimedia University, Jalan Multimedia, 63100 Cyberjaya, Selangor, Malaysia

Received 4 February 2014; Revised 8 April 2014; Accepted 1 May 2014; Published 27 May 2014

Academic Editor: Agusti Solanas

Copyright © 2014 Peng Foong Ho et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [6 citations]

The following is the list of published articles that have cited the current article.

  • Pradyumn Nand, Prashast Kumar Singh, Joy Aneja, and Yash Dhingra, “Prevention of shoulder surfing attack using randomized square matrix virtual keyboard,” 2015 International Conference on Advances in Computer Engineering and Applications, pp. 916–920, . View at Publisher · View at Google Scholar
  • Senthamarai Kannan, and Saranya, “An enhanced hidden markov dynamic bayesian model for resisting camouflaging worm attack study,” Asian Journal of Information Technology, vol. 15, no. 18, pp. 3616–3623, 2016. View at Publisher · View at Google Scholar
  • Tugrul Yumak, Dustin Bragg, and Edward M. Sabolsky, “Effect of synthesis methods on the surface and electrochemical characteristics of metal oxide/activated carbon composites for supercapacitor applications,” Applied Surface Science, 2018. View at Publisher · View at Google Scholar
  • Amanul Islam, Lip Yee Por, Fazidah Othman, and Chin Soon Ku, “A Review on Recognition-Based Graphical Password Techniques,” Computational Science and Technology, vol. 481, pp. 503–512, 2018. View at Publisher · View at Google Scholar
  • Mohd. Helmi Mat Lazim, and Nur Haryani Zakaria, “Security Evaluation of Distortion Technique for Graphical Authentication,” User Science and Engineering, vol. 886, pp. 313–324, 2018. View at Publisher · View at Google Scholar
  • Jeremiah D. Still, and Jarad Bell, “Incognito: Shoulder-surfing resistant selection method,” Journal of Information Security and Applications, vol. 40, pp. 1–8, 2018. View at Publisher · View at Google Scholar