Advance Security for Identifying Users without Their Login Ids

Authors

  • Manjunath R Computer Science & Engineering, City Engineering College, Bangalore, India
  • Suresha TG Computer Science & Engineering, City Engineering College, Bangalore, India
  • Ashok kumar PS Professor & Head, Dept. of CSE AIems, Bengalore

Keywords:

Cybersecurity, authentication, identification, Password

Abstract

Authentication to a computing system is composed of two parts, identification and verification. Traditionally, login IDs have been used for identification and passwords for verification. The method that can augment the current password-based system by strengthening the identification process. It utilizes personal secret data instead of a login ID to identify a user uniquely. It then asks the user to choose a correct login ID among multiple choices of partially obscured IDs. Since it does not accept a login ID during the authentication process, a stolen or cracked password cannot be used for gaining an access to the computing system unless the attacker provides a correct identification material. Hence in this paper, provide more security in the system. The security can be provided using user authentication, device authentication and captcha as a protocol step.

References

R. Dhamija, and A. Perrig. “Déjà Vu: A User StudyUsing Images for Authentication”. In 9th USENIX Security Symposium, 2000.

Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., “The design and analysis of graphical passwords” in Proceedings of USENIX Security Symposium, August 1999.

A. F. Syukri, E. Okamoto, and M. Mambo, "A User identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): SpringerVerlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.

Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang.Liu Uwe Aickelin, “A New Graphical Password Scheme Resistant to Shoulder-Surfing.”

S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy,,N.Memon, “Design and longitudinal evaluation of a>graphical password system”. International J. of Human-Computer Studies 63 (2005) 102-127.

H. Zhao and X. Li, "S3PAS: A Scalable ShoulderSurfing Resistant Textual-Graphical Password Authentication Scheme," in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 07), vol. 2. Canada, 2007, pp. 467-472.

S. Man, D. Hong, and M. Mathews, "A shoulder surfing resistant graphical password scheme,,”in Proceedings of International conference on security and management. Las Vegas, NV, 2003.

Downloads

Published

2025-11-11

How to Cite

[1]
R. Manjunath, T. Suresha, and P. Ashok kumar, “Advance Security for Identifying Users without Their Login Ids”, Int. J. Comp. Sci. Eng., vol. 4, no. 3, pp. 143–147, Nov. 2025.