[PDF][PDF] Exploration and field study of a browser-based password manager using icon-based passwords

K Bicakci, NB Atalay, M Yuceel… - Workshop on Real-Life …, 2011 - cs.carleton.ca
We carry out a hybrid lab and field study of a password manager program, and report on
usability and security. Our study explores iPMAN, a browser-based password manager that …

[PDF][PDF] Graphical password scheme using cued click point and persuasion with multiple images

A Sarim, R Jayesh, K Ishan, S Adil… - Int J Recent Innovation …, 2018 - academia.edu
There are three main categories of authentication system–token-based (what you have),
biometric-based (who you are) and knowledge-based (what you know). Cued Click Point is …

Security analyses of click-based graphical passwords via image point memorability

BB Zhu, J Yan, D Wei, M Yang - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
We propose a novel concept and a model of image point memorability (IPM) for analyzing
click-based graphical passwords that have been studied extensively in both the security and …

Securing web accounts by graphical password and voice notification

V Lupu - 2018 IEEE International Conference on Engineering …, 2018 - ieeexplore.ieee.org
Authentication of web service users has evolved continuously from a process based on
typing user name and password to the multi-factor authentication methods using advanced …

[PDF][PDF] Graphical Password based authentication system with sound sequence

S Sayed, A Mohid, M Pal, M Haji - International Journal of Computer …, 2016 - academia.edu
There have been many graphical password schemes proposed as alternatives to text
passwords. Research and experience show that alpha-numeric passwords are inefficient …

Quantifying the effect of graphical password guidelines for better security

M Jali, S Furnell, P Dowland - Future Challenges in Security and Privacy …, 2011 - Springer
Authentication using images or graphical passwords is one of the possible alternatives for
traditional authentication based upon passwords. This study aims to investigate the …

The pattern-richness of graphical passwords

JS Vorster, RP Van Heerden… - 2016 Information Security …, 2016 - ieeexplore.ieee.org
Conventional (text-based) passwords have shown patterns such as variations on the
username, or known passwords such as “password”,“admin” or “12345”. Patterns may …

[PDF][PDF] Cued click points graphical images and text password along with pixel based otp authentication

A Abuthaheer, NSJ Karthikka, TM Thiyagu - International Journal of …, 2014 - Citeseer
ABSTRACT A graphical password uses images or representation of images as passwords.
Human brain is easily remembering the Graphical image secret word compare to Text secret …

[PDF][PDF] Image based authentication for folder security using persuasive cued click-points and SHA

S Hande, N Dighade, R Bhusari, M Shende… - IOSR Journal of …, 2014 - academia.edu
In this paper Image Based Authentication application is applied on folder's (folders that are
confidential to user), since the studies till date have shown that textual passwords are more …

[PDF][PDF] Securing Image Password by using Persuasive Cued Click Points with AES Algorithm

S Chaturvedi, R Sharma - … ) International Journal of Computer Science and …, 2014 - Citeseer
In Digital environment authentication plays a major role. For authentication purpose the
graphical based technique is used. The purpose of this paper is increasing the security …