Securing web accounts by graphical password and voice notification

V Lupu - 2018 IEEE International Conference on Engineering …, 2018 - ieeexplore.ieee.org
Authentication of web service users has evolved continuously from a process based on
typing user name and password to the multi-factor authentication methods using advanced …

" Speak, Friend, and Enter"-Secure, Spoken One-Time Password Authentication

OM Latvala, C Peng, P Honkamaa… - 2018 9th IFIP …, 2018 - ieeexplore.ieee.org
User authentication is a long-standing problem in need of a comprehensive solution. As
technology progresses towards more ubiquitous connectivity and digital services, there is a …

Survey on usable and secure two-factor authentication

BS Archana, A Chandrashekar… - 2017 2nd IEEE …, 2017 - ieeexplore.ieee.org
System resources are usually not retrieved through deception by users who are not legal.
This is basically ensured by Authentication. Text password is one of the forms of user …

A usable authentication system based on personal voice challenge

Z Yan, S Zhao - … Conference on Advanced Cloud and Big Data …, 2016 - ieeexplore.ieee.org
User authentication is a major approach to guarantee the security of online or cloud services
when using user devices such as tablets or mobile phones to access remote servers …

Web based security analysis of OPASS authentication schemes using mobile application

M Rama, SS Raja - … conference on emerging trends in VLSI …, 2013 - ieeexplore.ieee.org
Graphical password, text password are authentication of users on websites because of its
simplicity and easy. User's passwords are easy to hack by using different malicious …

Improved Multi-layer Authentication Scheme by Merging One-time Password with Voice Biometric Factor

A ALRUWAILI, S Hendaoui - International Journal of Computer …, 2021 - koreascience.kr
In this proposal, we aim to enhance the security of systems accounts by improving the
authentication techniques. We mainly intend to enhance the accuracy of the one-time …

Secure Mobile Login using Three-Layer Graphical User Interface (GUI) Authentication

NSK Bashah, MAAK Niza… - 2023 IEEE 8th International …, 2023 - ieeexplore.ieee.org
Mobile devices are very important in our daily life nowadays. However, it has security
drawbacks particularly in device authentication. Conventional text-based passwords are …

A Potpourri of authentication mechanisms The mobile device way

RA Martins, AB Augusto… - 2013 8th Iberian …, 2013 - ieeexplore.ieee.org
Nowadays the use of mobile devices, such as smartphones and tablets, are rapidly
increasing in network services, proliferating to almost every environment. This massive …

Authentication by graphical passwords method 'hope'

N Zujevs - 2019 International Conference on Computing …, 2019 - ieeexplore.ieee.org
The security of data and user authentication is an important component of currently
deployed security infrastructures. Typical text-based passwords and PIN codes have several …

Biometric based user authentication in smart phones

M Verma, R Sawhney, R Chalia - … International Conference on …, 2017 - ieeexplore.ieee.org
Authenticity of a user is considered to be as one of the most sensitive issue that requires
attention especially in the case of smart phones, where the statistics concludes that, almost …