Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Lisset Suárez-Plasencia"'
Autor:
Joaquín Alberto Herrera-Macías, Lisset Suárez-Plasencia, Carlos Miguel Legón-Pérez, Guillermo Sosa-Gómez, Omar Rojas
Publikováno v:
Information, Vol 15, Iss 8, p 447 (2024)
This research paper presents a new test based on a novel approach for identifying clustered graphical passwords within the Passpoints scenario. Clustered graphical passwords are considered a weakness of graphical authentication systems, introduced by
Externí odkaz:
https://doaj.org/article/8158ea87c410499b8a878496f2a1ff6a
Autor:
Lisset Suárez-Plasencia, Joaquín Alberto Herrera-Macías, Carlos Miguel Legón-Pérez, Guillermo Sosa-Gómez, Omar Rojas
Publikováno v:
Sensors, Vol 22, Iss 5, p 1987 (2022)
An alternative authentication method to traditional alphanumeric passwords is graphical password authentication, also known as graphical authentication, for which one of the most valuable cued-recall techniques is PassPoints. This technique stands ou
Externí odkaz:
https://doaj.org/article/926ccb78be72461c9c573d38f77823f2
Autor:
Joaquín Alberto Herrera-Macías, Carlos Miguel Legón-Pérez, Lisset Suárez-Plasencia, Luis Ramiro Piñeiro-Díaz, Omar Rojas, Guillermo Sosa-Gómez
Publikováno v:
Symmetry, Vol 13, Iss 5, p 777 (2021)
This work demonstrates the ineffectiveness of the Ripley’s K function tests, the distance to the nearest neighbor, and the empty space function in the Graphical Authentication scenario with Passpoint for the detection of non-random graphical passwo
Externí odkaz:
https://doaj.org/article/d6ba72d0e09742fbb32c4fdc1ca8aab8
Autor:
Guillermo Sosa-Gómez, Joaquín Alberto Herrera Macías, Lisset Suárez Plasencia, Omar Rojas, Carlos Miguel Legón-Pérez, Raisa Socorro Llanes
Publikováno v:
Security and Communication Networks. 2022:1-14
PassPoint is a graphical authentication technique that is based on the selection of five points in an image. A detected vulnerability lies in the possible existence of a pattern in the points that make up the password. The objective of this work is t
Autor:
Guillermo Sosa-Gómez, Joaquín Alberto Herrera Macías, Lisset Suárez Plasencia, Omar Rojas, Carlos Miguel Legón-Pérez
Publikováno v:
Sensors; Volume 22; Issue 5; Pages: 1987
An alternative authentication method to traditional alphanumeric passwords is graphical password authentication, also known as graphical authentication, for which one of the most valuable cued-recall techniques is PassPoints. This technique stands ou
Autor:
Lisset Suárez-Plasencia, Carlos Miguel Legón-Pérez, Joaquín A. Herrera-Macías, Omar Rojas, Guillermo Sosa-Gómez, Luis R. Piñeiro-Díaz
Publikováno v:
Symmetry; Volume 13; Issue 5; Pages: 777
Symmetry, Vol 13, Iss 777, p 777 (2021)
Symmetry, Vol 13, Iss 777, p 777 (2021)
This work demonstrates the ineffectiveness of the Ripley’s K function tests, the distance to the nearest neighbor, and the empty space function in the Graphical Authentication scenario with Passpoint for the detection of non-random graphical passwo
Autor:
Raisa Socorro-Llanes, Guillermo Sosa-Gómez, Lisset Suárez-Plasencia, Omar Rojas, Joaquín A. Herrera-Macías, Carlos Miguel Legón-Pérez
Publikováno v:
Computer Science and Health Engineering in Health Services ISBN: 9783030698386
The probabilistic distribution of the characteristics of Voronoi polygons has been extensively studied due to its many areas of application. In various works that differ in the number of polygons generated and in the size of their regions, it is conc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::aa864263e12f522f7619a5fcbb428f94
https://doi.org/10.1007/978-3-030-69839-3_13
https://doi.org/10.1007/978-3-030-69839-3_13
Autor:
Omar Rojas, Lisset Suárez-Plasencia, Joaquín A. Herrera-Macías, Luis R. Piñeiro-Díaz, Guillermo Sosa-Gómez, Carlos Miguel Legón-Pérez
Publikováno v:
Computer Science and Health Engineering in Health Services ISBN: 9783030698386
This paper explores the usability of the Ripley’s K function and the nearest neighbor distance, in the detection of clustered graphical passwords in the graphical authentication stage. For it, both tests were applied to two bases of data of 10, 000
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a07caa3e3202c74a90c158918f1e000b
https://doi.org/10.1007/978-3-030-69839-3_12
https://doi.org/10.1007/978-3-030-69839-3_12
Autor:
Alex Sánchez Saez, Evaristo José Madarro Capó, Joaquín A. Herrera Macías, Lisset Suárez Plasencia
Publikováno v:
Telemática, Vol 22 (2024)
La autenticación es crucial para la protección de los usuarios y sus datos. Debido a las debilidades que aparecen en las contraseñas alfanuméricas por la acción de los usuarios, se han desarrollado nuevos enfoques como son los basados en autenti
Externí odkaz:
https://doaj.org/article/8512552eff5149a6a54121568e25c1f9