Get the complete project »
- The Complete Research Material is averagely 90 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦7,000
Authentication is unavoidable in any environment where sensitive information is utilized. In accessing resources via the Internet, the most common means of identification required for authentication is the user’s identity and a secret passphrase known as a password. Studies have shown that the birth of graphical password which uses images/pictures/objects was out of the trivial password generated by users because of the inability to remember complex passwords when using text-based password. Graphical password is stronger and increases memorability. However, graphical-based password is faced with several challenges including, a high storage capacity for all the images/pictures/objects, no assistance for users in browsing through an array of images/pictures/objects and vulnerability to shoulder surfing attacks.
The graphical authentication scheme was evaluated using Magic Triangle Evaluation model. The results showed that the password space and entropy were 2.61*104 and 14.39 respectively. The scheme showed a level of resistance of about 85% towards shoulder surfing attacks.
The study concluded that the graphical authentication scheme has a high level of resistance against shoulder surfing attacks but a low password space and entropy making it vulnerable to brute force attacks. It is therefore recommended to be used in an environment where shoulder surfing is inevitable and additional security mechanism should be added to reduce its vulnerability to brute force attacks. It can also be used as a Completely Automated Turing Test to tell Computers and Humans Apart (CAPTCHA).
Keywords: Graphical authentication, Shoulder surfing attack, Brute force attack, Web-based
application, Password space and Entropy.
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONEINTRODUCTION1.1 Background of the StudyAn Electronic Patient Management System is any tool used to assist in the delivery of clinical care ...Continue Reading »
» ABSTRACT Drug procurement and distribution tracking system is a set of computer programs that obtains the supplies of drugs, distribute the drugs and ...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY Employee records may be defined as "record that contain initial application forms, results of physica...Continue Reading »
» ABSTRACT A visa is most commonly a sticker endorsed in the applicant's passport or other travel document. The visa, when required, was historically gr...Continue Reading »
5. DESIGN AND IMPLEMENTATION OF A WEB-BASED TRADING SYSTEM (A CASE STUDY OF FEDERAL UNIVERSITY OF TECHNOLOGY, MINNA).» CHAPTER ONE INTRODUCTION 1.0 INTRODUCTION This chapter unfold the impact of Web based Trading System, it background information, the statement of the ...Continue Reading »
» ABSTRACT The increasing growth of social business applications has created a new set of demands on employees’ time and attention. As people particip...Continue Reading »
7. DESIGN AND IMPLEMENTATION OF STUDENT PROJECT MANAGEMENT AND ALLOCATION SYSTEM (Case study of Kogi State Polytechnic, Lokoja)» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY In many tertiary institutions in the country, students seek a project in a given field of specialty a...Continue Reading »
» INTRODUCTION 1.1 BACKGROUND STUDY. Every Nigerian university has the obligation to record and take student attendance during lecture periods every sem...Continue Reading »
» CHAPTER ONE 1.0 INTRODUCTION 1.1 General Overview In recent years, the technology of database has become more advanced where large amount of data is r...Continue Reading »
» CHAPTER ONE 1.0 INTRODUCTION 1.1 Background of the Study Result Computing and Online Result Checker are vital recurrent procedures and processes in ev...Continue Reading »