Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations

A Constantinides, M Belk, C Fidas, R Beumers… - ACM Transactions on …, 2023 - dl.acm.org
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …

Verification Grid and Map Slipping Based Graphical Password against Shoulder‐Surfing Attacks

Z Wang, L Liao, R Meng, CN Yang… - Security and …, 2022 - Wiley Online Library
Graphical password systems have received significant attention as one potential solution to
the need for more usable authentication, but graphical passwords are often considered …

Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation

Z Zhao, GJ Ahn, H Hu - ACM Transactions on Information and System …, 2015 - dl.acm.org
Picture gesture authentication has been recently introduced as an alternative login
experience to text-based password on touch-screen devices. In particular, the newly on …

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones

W Meng, W Li, LF Kwok, KKR Choo - Computers & security, 2017 - Elsevier
Graphical passwords (GPs) are recognised as one of the potential alternatives in addressing
the limitations in conventional text-based password authentication. With the rapid …

Designing click-draw based graphical password scheme for better authentication

Y Meng - 2012 IEEE Seventh International Conference on …, 2012 - ieeexplore.ieee.org
Nowadays, graphical password is being regarded as a promising alternative in network
security to replace traditional text-based password in which users interact with images for …

Nudging with construal level theory to improve online password use and intended password choice: a security-usability tradeoff perspective

JP Kaleta, JS Lee, S Yoo - Information Technology & People, 2019 - emerald.com
Purpose The purpose of this paper is to focus on a potential tradeoff between security and
usability in people's use of online passwords–in general, complex passwords are secure …

G-RAT| a novel graphical randomized authentication technique for consumer smart devices

MA Khan, IU Din, SU Jadoon, MK Khan… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
User authentication is the process that is exercised millions of times around the globe by
using different techniques and methods. The most prominent way of authentication is …

From hot-spots towards experience-spots: Leveraging on users' sociocultural experiences to enhance security in cued-recall graphical authentication

A Constantinides, C Fidas, M Belk, AM Pietron… - International Journal of …, 2021 - Elsevier
This paper suggests a novel cued-recall-based graphical authentication method, which
leverages on users' sociocultural experiences for improving the security and memorability of …

TIM: Secure and usable authentication for smartphones

GC Yang, Q Hu, MR Asghar - Journal of information security and …, 2022 - Elsevier
With the widespread popularity of smartphones and mobile applications, they have
gradually penetrated and are widely used in our daily lives, eg, we use them for online …

A taxonomy of multimedia-based graphical user authentication for green Internet of Things

KA Awan, I Ud Din, A Almogren, N Kumar… - ACM Transactions on …, 2021 - dl.acm.org
Authentication receives enormous consideration from the research community and is proven
to be an interesting field in today's era. User authentication is the major concern because …