Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication

The safety of the traditional text passwords is questioned by many users in the present information research. Graphical passwords become new research object of many researchers, who hope they can replace the existing text passwords and improve user account security. We are studying Topsnut-graphical...

Full description

Bibliographic Details
Main Authors: Sun Hui, Zhang Xiaohui, Yao Bing
Format: Article
Language:English
Published: EDP Sciences 2017-01-01
Series:MATEC Web of Conferences
Online Access:https://doi.org/10.1051/matecconf/201713900204
id doaj-e3dc40bf7ac24f5eabcf2d8ebf407403
record_format Article
spelling doaj-e3dc40bf7ac24f5eabcf2d8ebf4074032021-03-02T09:20:08ZengEDP SciencesMATEC Web of Conferences2261-236X2017-01-011390020410.1051/matecconf/201713900204matecconf_icmite2017_00204Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In CommunicationSun HuiZhang XiaohuiYao BingThe safety of the traditional text passwords is questioned by many users in the present information research. Graphical passwords become new research object of many researchers, who hope they can replace the existing text passwords and improve user account security. We are studying Topsnut-graphical passwords, which can be traced back to an idea of “topological structure plus number theory” proposed first by Hongyu Wang with her colleagues, and we found the equivalence between with Topsnut-graphics passwords of the trees having perfect matching. Through designing new parametric graphical labellings, we hope to enrich the variety of Topsnut-graphical passwords, and study the relationship between new parametric graphic labellings and existing labellings on trees having perfect matching. In addition, we also found, by two kinds of special operations, trees having perfect matching can be converted into paths perfect matching, and the nature of the original passwords remains unchanged. Our results can be provided to two or more banking users, and our method can easily be converted into polynomial time algorithms.https://doi.org/10.1051/matecconf/201713900204
collection DOAJ
language English
format Article
sources DOAJ
author Sun Hui
Zhang Xiaohui
Yao Bing
spellingShingle Sun Hui
Zhang Xiaohui
Yao Bing
Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication
MATEC Web of Conferences
author_facet Sun Hui
Zhang Xiaohui
Yao Bing
author_sort Sun Hui
title Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication
title_short Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication
title_full Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication
title_fullStr Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication
title_full_unstemmed Strongly (k, d)-Graphical Labellings For Designing Graphical Passwords In Communication
title_sort strongly (k, d)-graphical labellings for designing graphical passwords in communication
publisher EDP Sciences
series MATEC Web of Conferences
issn 2261-236X
publishDate 2017-01-01
description The safety of the traditional text passwords is questioned by many users in the present information research. Graphical passwords become new research object of many researchers, who hope they can replace the existing text passwords and improve user account security. We are studying Topsnut-graphical passwords, which can be traced back to an idea of “topological structure plus number theory” proposed first by Hongyu Wang with her colleagues, and we found the equivalence between with Topsnut-graphics passwords of the trees having perfect matching. Through designing new parametric graphical labellings, we hope to enrich the variety of Topsnut-graphical passwords, and study the relationship between new parametric graphic labellings and existing labellings on trees having perfect matching. In addition, we also found, by two kinds of special operations, trees having perfect matching can be converted into paths perfect matching, and the nature of the original passwords remains unchanged. Our results can be provided to two or more banking users, and our method can easily be converted into polynomial time algorithms.
url https://doi.org/10.1051/matecconf/201713900204
work_keys_str_mv AT sunhui stronglykdgraphicallabellingsfordesigninggraphicalpasswordsincommunication
AT zhangxiaohui stronglykdgraphicallabellingsfordesigninggraphicalpasswordsincommunication
AT yaobing stronglykdgraphicallabellingsfordesigninggraphicalpasswordsincommunication
_version_ 1724239669595471872