Attacks on Graphical Password: A Study on Defense Mechanisms and Limitations

I Roy, A Hossain, STA Rumee - International Journal of …, 2021 - woas-journals.com
User authentication is mostly reliant on password-based based verification. Users generally
used text-based passwords, which are user-friendly but often predictable and vulnerable to …

Simple screen locking method using randomly generated number grid on image

H Aris, Z Ibrahim, A Azman - Research Anthology on Securing Mobile …, 2021 - igi-global.com
Smartphones have become part and parcel of our daily life. Due to the more and more
advanced features incorporated, its role has extended beyond calls and text messages, and …

The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs

PG Kelley, S Komanduri, ML Mazurek, R Shay… - … Cryptography and Data …, 2013 - Springer
Over the last decade, several proposals have been made to replace the common personal
identification number, or PIN, with often-complicated but theoretically more secure systems …

Investigating the use of gesture-based passwords by the seniors

L Sreeramareddy, P Mulbah, JH Feng - … , HAS 2015, Held as Part of HCI …, 2015 - Springer
Older adults in the US are the fastest-growing demographic group, and also the fastest-
growing group of internet users [1]. Many computer related tasks, such as user …

[PDF][PDF] A tree grammar-based visual password scheme

BO Okundaye - 2016 - wiredspace.wits.ac.za
Visual password schemes can be considered as an alternative to alphanumeric passwords.
Studies have shown that alphanumeric passwords can, amongst others, be eavesdropped …

Ocenjevanje ranljivosti gesel na napad z opazovanjem: doctoral dissertation

L Bošnjak - 2022 - dk.um.si
Problem preverjanja pristnosti ostaja eden ključnih izzivov na področju informacijske
varnosti. Zaznamujejo ga naraščujoče varnostne pomanjkljivosti besedilnih gesel, ki že pol …

Android Pattern Unlock Authentication-effectiveness of local and global dynamic features

N Ibrahim, H Sellahewa - 2019 International Conference of the …, 2019 - ieeexplore.ieee.org
This study conducts a holistic analysis of the performances of biometric features
incorporated into Pattern Unlock authentication. The objective is to enhance the strength of …

[PDF][PDF] Hide my Gaze with EOG

RD Findling, T Quddus, S Sigg - Towards Closed-Eye Gaze …, 2019 - researchgate.net
Smart glasses allow for gaze gesture passwords as a hands-free form of mobile
authentication. However, pupil movements for password input are easily observed by …

[PDF][PDF] Leveraging eye gaze to enhance security mechanisms

A Mahmoud, Y Essam - 2023 - athene-forschung.rz.unibw …
After more than six decades, passwords remain a ubiquitous approach for authentication.
The main reason for this is that passwords currently provide a balance between usability …

SemanticLock: An authentication method for mobile devices using semantically-linked images

I Olade, H Liang, C Fleming - arXiv preprint arXiv:1806.11361, 2018 - arxiv.org
We introduce SemanticLock, a single factor graphical authentication solution for mobile
devices. SemanticLock uses a set of graphical images as password tokens that construct a …