Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …
Verification Grid and Map Slipping Based Graphical Password against Shoulder‐Surfing Attacks
Graphical password systems have received significant attention as one potential solution to
the need for more usable authentication, but graphical passwords are often considered …
the need for more usable authentication, but graphical passwords are often considered …
Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation
Picture gesture authentication has been recently introduced as an alternative login
experience to text-based password on touch-screen devices. In particular, the newly on …
experience to text-based password on touch-screen devices. In particular, the newly on …
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones
Graphical passwords (GPs) are recognised as one of the potential alternatives in addressing
the limitations in conventional text-based password authentication. With the rapid …
the limitations in conventional text-based password authentication. With the rapid …
Designing click-draw based graphical password scheme for better authentication
Y Meng - 2012 IEEE Seventh International Conference on …, 2012 - ieeexplore.ieee.org
Nowadays, graphical password is being regarded as a promising alternative in network
security to replace traditional text-based password in which users interact with images for …
security to replace traditional text-based password in which users interact with images for …
Nudging with construal level theory to improve online password use and intended password choice: a security-usability tradeoff perspective
Purpose The purpose of this paper is to focus on a potential tradeoff between security and
usability in people's use of online passwords–in general, complex passwords are secure …
usability in people's use of online passwords–in general, complex passwords are secure …
G-RAT| a novel graphical randomized authentication technique for consumer smart devices
User authentication is the process that is exercised millions of times around the globe by
using different techniques and methods. The most prominent way of authentication is …
using different techniques and methods. The most prominent way of authentication is …
From hot-spots towards experience-spots: Leveraging on users' sociocultural experiences to enhance security in cued-recall graphical authentication
This paper suggests a novel cued-recall-based graphical authentication method, which
leverages on users' sociocultural experiences for improving the security and memorability of …
leverages on users' sociocultural experiences for improving the security and memorability of …
TIM: Secure and usable authentication for smartphones
With the widespread popularity of smartphones and mobile applications, they have
gradually penetrated and are widely used in our daily lives, eg, we use them for online …
gradually penetrated and are widely used in our daily lives, eg, we use them for online …
A taxonomy of multimedia-based graphical user authentication for green Internet of Things
Authentication receives enormous consideration from the research community and is proven
to be an interesting field in today's era. User authentication is the major concern because …
to be an interesting field in today's era. User authentication is the major concern because …