[PDF][PDF] Exploration and field study of a browser-based password manager using icon-based passwords
We carry out a hybrid lab and field study of a password manager program, and report on
usability and security. Our study explores iPMAN, a browser-based password manager that …
usability and security. Our study explores iPMAN, a browser-based password manager that …
[PDF][PDF] Graphical password scheme using cued click point and persuasion with multiple images
A Sarim, R Jayesh, K Ishan, S Adil… - Int J Recent Innovation …, 2018 - academia.edu
There are three main categories of authentication system–token-based (what you have),
biometric-based (who you are) and knowledge-based (what you know). Cued Click Point is …
biometric-based (who you are) and knowledge-based (what you know). Cued Click Point is …
Security analyses of click-based graphical passwords via image point memorability
We propose a novel concept and a model of image point memorability (IPM) for analyzing
click-based graphical passwords that have been studied extensively in both the security and …
click-based graphical passwords that have been studied extensively in both the security and …
Securing web accounts by graphical password and voice notification
V Lupu - 2018 IEEE International Conference on Engineering …, 2018 - ieeexplore.ieee.org
Authentication of web service users has evolved continuously from a process based on
typing user name and password to the multi-factor authentication methods using advanced …
typing user name and password to the multi-factor authentication methods using advanced …
[PDF][PDF] Graphical Password based authentication system with sound sequence
S Sayed, A Mohid, M Pal, M Haji - International Journal of Computer …, 2016 - academia.edu
There have been many graphical password schemes proposed as alternatives to text
passwords. Research and experience show that alpha-numeric passwords are inefficient …
passwords. Research and experience show that alpha-numeric passwords are inefficient …
Quantifying the effect of graphical password guidelines for better security
Authentication using images or graphical passwords is one of the possible alternatives for
traditional authentication based upon passwords. This study aims to investigate the …
traditional authentication based upon passwords. This study aims to investigate the …
The pattern-richness of graphical passwords
JS Vorster, RP Van Heerden… - 2016 Information Security …, 2016 - ieeexplore.ieee.org
Conventional (text-based) passwords have shown patterns such as variations on the
username, or known passwords such as “password”,“admin” or “12345”. Patterns may …
username, or known passwords such as “password”,“admin” or “12345”. Patterns may …
[PDF][PDF] Cued click points graphical images and text password along with pixel based otp authentication
A Abuthaheer, NSJ Karthikka, TM Thiyagu - International Journal of …, 2014 - Citeseer
ABSTRACT A graphical password uses images or representation of images as passwords.
Human brain is easily remembering the Graphical image secret word compare to Text secret …
Human brain is easily remembering the Graphical image secret word compare to Text secret …
[PDF][PDF] Image based authentication for folder security using persuasive cued click-points and SHA
S Hande, N Dighade, R Bhusari, M Shende… - IOSR Journal of …, 2014 - academia.edu
In this paper Image Based Authentication application is applied on folder's (folders that are
confidential to user), since the studies till date have shown that textual passwords are more …
confidential to user), since the studies till date have shown that textual passwords are more …
[PDF][PDF] Securing Image Password by using Persuasive Cued Click Points with AES Algorithm
S Chaturvedi, R Sharma - … ) International Journal of Computer Science and …, 2014 - Citeseer
In Digital environment authentication plays a major role. For authentication purpose the
graphical based technique is used. The purpose of this paper is increasing the security …
graphical based technique is used. The purpose of this paper is increasing the security …