Attacks on Graphical Password: A Study on Defense Mechanisms and Limitations
I Roy, A Hossain, STA Rumee - International Journal of …, 2021 - woas-journals.com
User authentication is mostly reliant on password-based based verification. Users generally
used text-based passwords, which are user-friendly but often predictable and vulnerable to …
used text-based passwords, which are user-friendly but often predictable and vulnerable to …
Simple screen locking method using randomly generated number grid on image
H Aris, Z Ibrahim, A Azman - Research Anthology on Securing Mobile …, 2021 - igi-global.com
Smartphones have become part and parcel of our daily life. Due to the more and more
advanced features incorporated, its role has extended beyond calls and text messages, and …
advanced features incorporated, its role has extended beyond calls and text messages, and …
The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs
Over the last decade, several proposals have been made to replace the common personal
identification number, or PIN, with often-complicated but theoretically more secure systems …
identification number, or PIN, with often-complicated but theoretically more secure systems …
Investigating the use of gesture-based passwords by the seniors
L Sreeramareddy, P Mulbah, JH Feng - … , HAS 2015, Held as Part of HCI …, 2015 - Springer
Older adults in the US are the fastest-growing demographic group, and also the fastest-
growing group of internet users [1]. Many computer related tasks, such as user …
growing group of internet users [1]. Many computer related tasks, such as user …
[PDF][PDF] A tree grammar-based visual password scheme
BO Okundaye - 2016 - wiredspace.wits.ac.za
Visual password schemes can be considered as an alternative to alphanumeric passwords.
Studies have shown that alphanumeric passwords can, amongst others, be eavesdropped …
Studies have shown that alphanumeric passwords can, amongst others, be eavesdropped …
Ocenjevanje ranljivosti gesel na napad z opazovanjem: doctoral dissertation
L Bošnjak - 2022 - dk.um.si
Problem preverjanja pristnosti ostaja eden ključnih izzivov na področju informacijske
varnosti. Zaznamujejo ga naraščujoče varnostne pomanjkljivosti besedilnih gesel, ki že pol …
varnosti. Zaznamujejo ga naraščujoče varnostne pomanjkljivosti besedilnih gesel, ki že pol …
Android Pattern Unlock Authentication-effectiveness of local and global dynamic features
N Ibrahim, H Sellahewa - 2019 International Conference of the …, 2019 - ieeexplore.ieee.org
This study conducts a holistic analysis of the performances of biometric features
incorporated into Pattern Unlock authentication. The objective is to enhance the strength of …
incorporated into Pattern Unlock authentication. The objective is to enhance the strength of …
[PDF][PDF] Hide my Gaze with EOG
Smart glasses allow for gaze gesture passwords as a hands-free form of mobile
authentication. However, pupil movements for password input are easily observed by …
authentication. However, pupil movements for password input are easily observed by …
[PDF][PDF] Leveraging eye gaze to enhance security mechanisms
A Mahmoud, Y Essam - 2023 - athene-forschung.rz.unibw …
After more than six decades, passwords remain a ubiquitous approach for authentication.
The main reason for this is that passwords currently provide a balance between usability …
The main reason for this is that passwords currently provide a balance between usability …
SemanticLock: An authentication method for mobile devices using semantically-linked images
We introduce SemanticLock, a single factor graphical authentication solution for mobile
devices. SemanticLock uses a set of graphical images as password tokens that construct a …
devices. SemanticLock uses a set of graphical images as password tokens that construct a …