Periodicity: Bi Annual.
Impact Factor:
SJIF:5.079 & GIF:0.416
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

Paper Template
Copyright Form
Subscription Form
web counter
web counter

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCOA provides online manuscript tracking system.

Every issue of Journal of IJCOA is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCOA special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCOA website. For complete procedure, contact us at

SCIA Journal Metrics

Published in:   Vol. 5 Issue 1 Date of Publication:   June 2016
Page(s):   31-34 Publisher:   Integrated Intelligent Research (IIR)
DOI:   10.20894/IJCOA. SAI : 2014SCIA316F0859

Authentication is the process of allowing an authorized user to access a computer system. The commonly used system of authentication is the traditional Text passwordbased authentication mechanism. Though the traditional alphanumeric driven text password entry system is well known for its higher state of security, it even experiences some drawbacks. To replace the traditional schemes and overcome their shortcomings, alternative solutions like graphical password schemes have been introduced. The graphical password systems are less prone to dictionary attacks and are easy to use visually. However, these graphical password schemes suffer from a potential drawback of being more vulnerable to shoulder surfing attacks when compared to conventional text driven passwords. In this paper, we propose a text-graphic password entry system which protects the user�s password from being observed by attackers and prone to shoulder surfing and spyware attacks.