Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication
The safety of the traditional text passwords is questioned by many users in the present information research. Graphical passwords become new research object of many researchers, who hope they can replace the existing text passwords and improve user account security. We are studying Topsnut-graphical...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2017-01-01
|
Series: | MATEC Web of Conferences |
Online Access: | https://doi.org/10.1051/matecconf/201713900204 |
id |
doaj-e3dc40bf7ac24f5eabcf2d8ebf407403 |
---|---|
record_format |
Article |
spelling |
doaj-e3dc40bf7ac24f5eabcf2d8ebf4074032021-03-02T09:20:08ZengEDP SciencesMATEC Web of Conferences2261-236X2017-01-011390020410.1051/matecconf/201713900204matecconf_icmite2017_00204Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In CommunicationSun HuiZhang XiaohuiYao BingThe safety of the traditional text passwords is questioned by many users in the present information research. Graphical passwords become new research object of many researchers, who hope they can replace the existing text passwords and improve user account security. We are studying Topsnut-graphical passwords, which can be traced back to an idea of “topological structure plus number theory” proposed first by Hongyu Wang with her colleagues, and we found the equivalence between with Topsnut-graphics passwords of the trees having perfect matching. Through designing new parametric graphical labellings, we hope to enrich the variety of Topsnut-graphical passwords, and study the relationship between new parametric graphic labellings and existing labellings on trees having perfect matching. In addition, we also found, by two kinds of special operations, trees having perfect matching can be converted into paths perfect matching, and the nature of the original passwords remains unchanged. Our results can be provided to two or more banking users, and our method can easily be converted into polynomial time algorithms.https://doi.org/10.1051/matecconf/201713900204 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sun Hui Zhang Xiaohui Yao Bing |
spellingShingle |
Sun Hui Zhang Xiaohui Yao Bing Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication MATEC Web of Conferences |
author_facet |
Sun Hui Zhang Xiaohui Yao Bing |
author_sort |
Sun Hui |
title |
Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication |
title_short |
Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication |
title_full |
Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication |
title_fullStr |
Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication |
title_full_unstemmed |
Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication |
title_sort |
strongly (k, d)-graphical labellings for designing graphical passwords in communication |
publisher |
EDP Sciences |
series |
MATEC Web of Conferences |
issn |
2261-236X |
publishDate |
2017-01-01 |
description |
The safety of the traditional text passwords is questioned by many users in the present information research. Graphical passwords become new research object of many researchers, who hope they can replace the existing text passwords and improve user account security. We are studying Topsnut-graphical passwords, which can be traced back to an idea of “topological structure plus number theory” proposed first by Hongyu Wang with her colleagues, and we found the equivalence between with Topsnut-graphics passwords of the trees having perfect matching. Through designing new parametric graphical labellings, we hope to enrich the variety of Topsnut-graphical passwords, and study the relationship between new parametric graphic labellings and existing labellings on trees having perfect matching. In addition, we also found, by two kinds of special operations, trees having perfect matching can be converted into paths perfect matching, and the nature of the original passwords remains unchanged. Our results can be provided to two or more banking users, and our method can easily be converted into polynomial time algorithms. |
url |
https://doi.org/10.1051/matecconf/201713900204 |
work_keys_str_mv |
AT sunhui stronglykdgraphicallabellingsfordesigninggraphicalpasswordsincommunication AT zhangxiaohui stronglykdgraphicallabellingsfordesigninggraphicalpasswordsincommunication AT yaobing stronglykdgraphicallabellingsfordesigninggraphicalpasswordsincommunication |
_version_ |
1724239669595471872 |