A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments

B Lewis, P Kirupaharan, TM Ranalli… - ACM Transactions on …, 2024 - dl.acm.org
Current computing device authentication often presents accessibility barriers for people with
upper extremity impairments (UEI). In this article, we present a framework called Accessible …

Memorability of cued-recall graphical passwords with saliency masks

F Alt, M Mikusz, S Schneegass, A Bulling - Proceedings of the 15th …, 2016 - dl.acm.org
Cued-recall graphical passwords have a lot of potential for secure user authentication,
particularly if combined with saliency masks to prevent users from selecting weak …

A new graphical password based on decoy image portions (gp-dip)

MR Albayati, AH Lashkari - … and Computers in Sciences and in …, 2014 - ieeexplore.ieee.org
Graphical passwords have been proposed as an alternative to textual passwords, due to its
complexity that users are having in remembering their password combination. Graphical …

Developing and evaluating a gestural and tactile mobile interface to support user authentication

A Ali, AJ Aviv, R Kuber - IConference 2016 Proceedings, 2016 - ideals.illinois.edu
As awareness grows surrounding the importance of protecting sensitive data, stored on or
accessed through a mobile device, a need has been identified to develop authentication …

Act2Auth–A Novel Authentication Concept based on Embedded Tangible Interaction at Desks

S Delgado Rodriguez, S Prange, L Mecke… - Proceedings of the …, 2024 - dl.acm.org
Authentication (eg, entering a password) is frequently perceived as an annoying obstacle
when interacting with computational devices, but still essential to protect sensitive data from …

A contemplate on multifactor authentication

P Sharma - 2019 6th International Conference on Computing …, 2019 - ieeexplore.ieee.org
As a part of the protection among distributed systems, numerous services and resources
want protection from unauthorized use. Remote authentication is that the most ordinarily …

A wide range survey on recall based graphical user authentications algorithms based on iso and attack patterns

AH Lashkari, DR Saleh, S Farmand… - arXiv preprint arXiv …, 2010 - arxiv.org
Nowadays, user authentication is one of the important topics in information security. Text
based strong password schemes could provide with certain degree of security. However, the …

Utilizing binary code to improve usability of pressure-based authentication

Z Meng, J Kong, J Li - Computers & Security, 2021 - Elsevier
Due to its invisibility feature, pressure is useful to enhance the security of authentication,
especially preventing the shoulder surfing attack. However, users are more familiar with …

Continuous user authentication system: a risk analysis based approach

Neha, K Chatterjee - Wireless Personal Communications, 2019 - Springer
With the expansion of smart device users, the security mechanism of these devices in terms
of user authentication has been advanced a lot. These mechanisms consist of a pattern …

Gazelockpatterns: Comparing authentication using gaze and touch for entering lock patterns

Y Abdrabou, K Pfeuffer, M Khamis, F Alt - ACM Symposium on Eye …, 2020 - dl.acm.org
In this work, we present a comparison between Android's lock patterns for mobile devices
(TouchLockPatterns) and an implementation of lock patterns that uses gaze input …