[PDF][PDF] An improved authentication scheme based on graphical passwords

MA Alia, AA Hnaif, AM Abdalla, EMA Maria - ICIC Express Lett, 2018 - zuj.edu.jo
This paper presents a new password scheme that employs graphical user interface for
password entry. The password consists of multiple graphical objects that are integrated to …

[PDF][PDF] Graphical password authentication using images sequence

M Ahsan, Y Li - Int Res J Eng Technol (IRJET), 2017 - academia.edu
This paper proposes a new technique of user Authentication that is Graphical Password
Authentication using Images Sequence. In existing environment, a very important problem in …

An Improved Login Authenticable Model Using Memory Gallery Apps

AP Singh, R Khan, P Rahi, I Singh… - … Conference on Next …, 2023 - ieeexplore.ieee.org
The usage of mobile devices fulfills many purposes, including financial transactions,
personal data management, and multimedia. To secure the mobile devices from un …

Shoulder surfing resistant using Cued Click Point authentication system

N Ranjan, S Rishabh - AIP Conference Proceedings, 2022 - pubs.aip.org
The main objective of this Paper is to provide security to the users so that they can freely
access their resources without any problems. The Paper contains different levels and variety …

Pictorial Sequence Authentication Using Optimized Disarray System

CM Nalayini, J Katiravan, N Rajesh… - … in Computers and …, 2017 - ieeexplore.ieee.org
Authentication is a fundamental trust to any trust oriented computational frameworks and
furthermore a basic part in numerous security protocols. This paper gives other option to …

SUPA: Strewn user-preserved authentication

M Ahmed - 2017 - researcharchive.wintec.ac.nz
Central storage and management of user credentials or passwords leaves a single tempting
repository for the attackers. If the credentials are not stored by a system at all, there will be …