A survey on recognition based graphical user authentication algorithms

F Towhidi, M Masrom - arXiv preprint arXiv:0912.0942, 2009 - arxiv.org
Nowadays, user authentication is one of the important topics in information security. Strong
textbased password schemes could provide with certain degree of security. However, the …

Hide my gaze with EOG! towards closed-eye gaze gesture passwords that resist observation-attacks with electrooculography in smart glasses

RD Findling, T Quddus, S Sigg - … of the 17th International Conference on …, 2019 - dl.acm.org
Smart glasses allow for gaze gesture passwords as a hands-free form of mobile
authentication. However, pupil movements for password input are easily observed by …

Finding the middle ground: measuring passwords for security and memorability

JJ Rodriguez, MF Zibran… - 2022 IEEE/ACIS 20th …, 2022 - ieeexplore.ieee.org
Passwords are a ubiquitous element of our digital age, and the need for secure passwords
is indispensable. However, traditionally secure passwords tends to be very difficult to …

Story-based authentication for mobile devices using semantically-linked images

I Olade, HN Liang, C Fleming - International Journal of Human-Computer …, 2023 - Elsevier
We introduce SemanticLock, a simple, fast, and memorable single-factor graphical
authentication approach for mobile devices. SemanticLock uses a set of graphical images …

Designing textual password systems for children

JC Read, B Cassidy - Proceedings of the 11th international conference …, 2012 - dl.acm.org
This paper describes two studies that looked at passwords for children. The first examined
what children knew about the creation of textual passwords and then a second, follow on …

Impact of Two-Factor Authentication on User Convenience and Security

D Bhanderi, M Kavathiya, T Bhut… - … on Computing for …, 2023 - ieeexplore.ieee.org
Two-factor authentication is a security measure used to provide security to user accounts,
online transactions and for access of any sensitive data. The basic concept of two-factor …

Does the layout of the Android unlock pattern affect the security and usability of the password?

L Zhang, Y Guo, X Guo, X Shao - Journal of Information Security and …, 2021 - Elsevier
Currently, Android unlock pattern is the most widely used graphical unlock pattern. But, as
similar to text passwords, user-generated Android graphical passwords usually have lower …

[PDF][PDF] A systematic literature review of graphical password schemes

TI Shammee, T Akter, M Mou… - Journal of Computing …, 2020 - researchgate.net
Graphical passwords are an alternative to traditional alphanumeric passwords and can
similarly be used to secure online accounts. The widely used alphanumeric passwords have …

Tell me who you are and i will tell you your unlock pattern

MD Løge - 2015 - ntnuopen.ntnu.no
Graphical passwords, like the Android Pattern Lock, are a popular security mechanism for
mobile devices. The mechanism was proposed as an alternative to text-based passwords …

[PDF][PDF] Graphical passwords: Learning from the first generation

R Biddle, S Chiasson… - Ottawa, Canada: School of …, 2009 - hotsoft.carleton.ca
Numerous graphical password schemes have recently been proposed as alternatives to
traditional text password authentication. We provide a comprehensive overview of published …