WEKO3
アイテム
録画画像を用いた攻撃に耐性を持つパズル型認証方式の提案
http://hdl.handle.net/10458/6090
http://hdl.handle.net/10458/6090a16ec589-bd6a-49b7-a116-c4ec9492af04
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 紀要論文 / Departmental Bulletin Paper(1) | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2020-06-21 | |||||||||||||||||
タイトル | ||||||||||||||||||
タイトル | 録画画像を用いた攻撃に耐性を持つパズル型認証方式の提案 | |||||||||||||||||
言語 | ja | |||||||||||||||||
タイトル | ||||||||||||||||||
タイトル | Proposal of Puzzle Authentication Method with Video Recording Attack Resistance | |||||||||||||||||
言語 | en | |||||||||||||||||
言語 | ||||||||||||||||||
言語 | jpn | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | mobile security, shoulder-surfing, puzzle | |||||||||||||||||
資源タイプ | ||||||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||||
資源タイプ | departmental bulletin paper | |||||||||||||||||
その他(別言語等)のタイトル | ||||||||||||||||||
その他のタイトル | ロクガ ガゾウ オ モチイ タ コウゲキ ニ タイセイ オ ジ ツ パズル カタ ニンショウ ホウシキ ノ テイアン | |||||||||||||||||
著者 |
日隈, 光基
× 日隈, 光基× 山場, 久昭
WEKO
14888
× 久保田, 真一郎× 岡崎, 直宣
WEKO
11839
× 日隈, 光基× 久保田, 真一郎 |
|||||||||||||||||
抄録 | ||||||||||||||||||
内容記述タイプ | Abstract | |||||||||||||||||
内容記述 | Currently, user authentication methods such as PINs, passwords and so on, are used to protect important and private data in mobile devices. However, those existing methods are not sufficiently safe against shoulder surfing attacks. Attackers can easily steal PIN codes or passwords. To prevent such attacks, the puzzle authentication method was proposed. In the method, users unlock their devices thorough solving a “puzzle." A user drags an orb to adjacent positions, and the dragged orb swaps places with the orb already there. The authentication will succeed when all of the orbs corresponding to characters of the password are put into the designated positions. The special feature of this method is that users have fun while they unlock their devices. However, it was also known that the method has several drawbacks. First, the method is not strong enough against brute-force attacks. Next, the correct answer is easily revealed by shooting the authenticated screen using a video camera. In this study, several improvements were made to the method to overcome brute-force attacks and video recording attacks. The improved authentication method was implemented and experiments for evaluation were carried out. | |||||||||||||||||
言語 | en | |||||||||||||||||
書誌情報 |
ja : 宮崎大学工学部紀要 en : Memoirs of Faculty of Engineering, University of Miyazaki 巻 46, p. 263-268, 発行日 2017-07-31 |
|||||||||||||||||
出版者 | ||||||||||||||||||
出版者 | 宮崎大学工学部 | |||||||||||||||||
言語 | ja | |||||||||||||||||
出版者 | ||||||||||||||||||
出版者 | Faculty of Engineering, University of Miyazaki | |||||||||||||||||
言語 | en | |||||||||||||||||
ISSN | ||||||||||||||||||
収録物識別子タイプ | ISSN | |||||||||||||||||
収録物識別子 | 05404924 | |||||||||||||||||
書誌レコードID | ||||||||||||||||||
収録物識別子タイプ | NCID | |||||||||||||||||
収録物識別子 | AA00732558 | |||||||||||||||||
著者版フラグ | ||||||||||||||||||
出版タイプ | VoR | |||||||||||||||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 |