A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments
B Lewis, P Kirupaharan, TM Ranalli… - ACM Transactions on …, 2024 - dl.acm.org
Current computing device authentication often presents accessibility barriers for people with
upper extremity impairments (UEI). In this article, we present a framework called Accessible …
upper extremity impairments (UEI). In this article, we present a framework called Accessible …
Memorability of cued-recall graphical passwords with saliency masks
Cued-recall graphical passwords have a lot of potential for secure user authentication,
particularly if combined with saliency masks to prevent users from selecting weak …
particularly if combined with saliency masks to prevent users from selecting weak …
A new graphical password based on decoy image portions (gp-dip)
MR Albayati, AH Lashkari - … and Computers in Sciences and in …, 2014 - ieeexplore.ieee.org
Graphical passwords have been proposed as an alternative to textual passwords, due to its
complexity that users are having in remembering their password combination. Graphical …
complexity that users are having in remembering their password combination. Graphical …
Developing and evaluating a gestural and tactile mobile interface to support user authentication
As awareness grows surrounding the importance of protecting sensitive data, stored on or
accessed through a mobile device, a need has been identified to develop authentication …
accessed through a mobile device, a need has been identified to develop authentication …
Act2Auth–A Novel Authentication Concept based on Embedded Tangible Interaction at Desks
S Delgado Rodriguez, S Prange, L Mecke… - Proceedings of the …, 2024 - dl.acm.org
Authentication (eg, entering a password) is frequently perceived as an annoying obstacle
when interacting with computational devices, but still essential to protect sensitive data from …
when interacting with computational devices, but still essential to protect sensitive data from …
A contemplate on multifactor authentication
P Sharma - 2019 6th International Conference on Computing …, 2019 - ieeexplore.ieee.org
As a part of the protection among distributed systems, numerous services and resources
want protection from unauthorized use. Remote authentication is that the most ordinarily …
want protection from unauthorized use. Remote authentication is that the most ordinarily …
A wide range survey on recall based graphical user authentications algorithms based on iso and attack patterns
AH Lashkari, DR Saleh, S Farmand… - arXiv preprint arXiv …, 2010 - arxiv.org
Nowadays, user authentication is one of the important topics in information security. Text
based strong password schemes could provide with certain degree of security. However, the …
based strong password schemes could provide with certain degree of security. However, the …
Utilizing binary code to improve usability of pressure-based authentication
Z Meng, J Kong, J Li - Computers & Security, 2021 - Elsevier
Due to its invisibility feature, pressure is useful to enhance the security of authentication,
especially preventing the shoulder surfing attack. However, users are more familiar with …
especially preventing the shoulder surfing attack. However, users are more familiar with …
Continuous user authentication system: a risk analysis based approach
Neha, K Chatterjee - Wireless Personal Communications, 2019 - Springer
With the expansion of smart device users, the security mechanism of these devices in terms
of user authentication has been advanced a lot. These mechanisms consist of a pattern …
of user authentication has been advanced a lot. These mechanisms consist of a pattern …
Gazelockpatterns: Comparing authentication using gaze and touch for entering lock patterns
In this work, we present a comparison between Android's lock patterns for mobile devices
(TouchLockPatterns) and an implementation of lock patterns that uses gaze input …
(TouchLockPatterns) and an implementation of lock patterns that uses gaze input …