A survey on recognition based graphical user authentication algorithms
F Towhidi, M Masrom - arXiv preprint arXiv:0912.0942, 2009 - arxiv.org
Nowadays, user authentication is one of the important topics in information security. Strong
textbased password schemes could provide with certain degree of security. However, the …
textbased password schemes could provide with certain degree of security. However, the …
Hide my gaze with EOG! towards closed-eye gaze gesture passwords that resist observation-attacks with electrooculography in smart glasses
Smart glasses allow for gaze gesture passwords as a hands-free form of mobile
authentication. However, pupil movements for password input are easily observed by …
authentication. However, pupil movements for password input are easily observed by …
Finding the middle ground: measuring passwords for security and memorability
JJ Rodriguez, MF Zibran… - 2022 IEEE/ACIS 20th …, 2022 - ieeexplore.ieee.org
Passwords are a ubiquitous element of our digital age, and the need for secure passwords
is indispensable. However, traditionally secure passwords tends to be very difficult to …
is indispensable. However, traditionally secure passwords tends to be very difficult to …
Story-based authentication for mobile devices using semantically-linked images
We introduce SemanticLock, a simple, fast, and memorable single-factor graphical
authentication approach for mobile devices. SemanticLock uses a set of graphical images …
authentication approach for mobile devices. SemanticLock uses a set of graphical images …
Designing textual password systems for children
This paper describes two studies that looked at passwords for children. The first examined
what children knew about the creation of textual passwords and then a second, follow on …
what children knew about the creation of textual passwords and then a second, follow on …
Impact of Two-Factor Authentication on User Convenience and Security
D Bhanderi, M Kavathiya, T Bhut… - … on Computing for …, 2023 - ieeexplore.ieee.org
Two-factor authentication is a security measure used to provide security to user accounts,
online transactions and for access of any sensitive data. The basic concept of two-factor …
online transactions and for access of any sensitive data. The basic concept of two-factor …
Does the layout of the Android unlock pattern affect the security and usability of the password?
L Zhang, Y Guo, X Guo, X Shao - Journal of Information Security and …, 2021 - Elsevier
Currently, Android unlock pattern is the most widely used graphical unlock pattern. But, as
similar to text passwords, user-generated Android graphical passwords usually have lower …
similar to text passwords, user-generated Android graphical passwords usually have lower …
[PDF][PDF] A systematic literature review of graphical password schemes
TI Shammee, T Akter, M Mou… - Journal of Computing …, 2020 - researchgate.net
Graphical passwords are an alternative to traditional alphanumeric passwords and can
similarly be used to secure online accounts. The widely used alphanumeric passwords have …
similarly be used to secure online accounts. The widely used alphanumeric passwords have …
Tell me who you are and i will tell you your unlock pattern
MD Løge - 2015 - ntnuopen.ntnu.no
Graphical passwords, like the Android Pattern Lock, are a popular security mechanism for
mobile devices. The mechanism was proposed as an alternative to text-based passwords …
mobile devices. The mechanism was proposed as an alternative to text-based passwords …
[PDF][PDF] Graphical passwords: Learning from the first generation
R Biddle, S Chiasson… - Ottawa, Canada: School of …, 2009 - hotsoft.carleton.ca
Numerous graphical password schemes have recently been proposed as alternatives to
traditional text password authentication. We provide a comprehensive overview of published …
traditional text password authentication. We provide a comprehensive overview of published …