Enhancing the security of FinTech applications with map-based graphical password authentication

W Meng, L Zhu, W Li, J Han, Y Li - Future Generation Computer Systems, 2019 - Elsevier
With the rapid development of information technology (IT) in financial industry, financial
technology (FinTech) has become an emerging area for enterprises and organizations. Due …

Emerging NUI-based methods for user authentication: A new taxonomy and survey

N Sae-Bae, J Wu, N Memon, J Konrad… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the convenience and cost benefits of natural user interface (NUI) technologies are
hastening their wide adoption, computing devices equipped with such interfaces are …

THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network

L Fang, Y Li, X Yun, Z Wen, S Ji… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
SDN has provided significant convenience for network providers and operators in cloud
computing. Such a great advantage is extending to the Internet of Things network. However …

Nudging with construal level theory to improve online password use and intended password choice: a security-usability tradeoff perspective

JP Kaleta, JS Lee, S Yoo - Information Technology & People, 2019 - emerald.com
Purpose The purpose of this paper is to focus on a potential tradeoff between security and
usability in people's use of online passwords–in general, complex passwords are secure …

G-RAT| a novel graphical randomized authentication technique for consumer smart devices

MA Khan, IU Din, SU Jadoon, MK Khan… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
User authentication is the process that is exercised millions of times around the globe by
using different techniques and methods. The most prominent way of authentication is …

[PDF][PDF] Security and user interface usability of graphical authentication systems–A review

HU Suru, P Murano - International Journal of Engineering Trends and …, 2019 - academia.edu
Alphanumeric text and PINs continue to be the dominant authentication methods in spite of
the numerous concerns by security researchers of their inability to properly address usability …

A fractal-based authentication technique using sierpinski triangles in smart devices

A Ali, H Rafique, T Arshad, MA Alqarni, SH Chauhdary… - Sensors, 2019 - mdpi.com
The prevalence of smart devices in our day-to-day activities increases the potential threat to
our secret information. To counter these threats like unauthorized access and misuse of …

[PDF][PDF] The coin passcode: A shoulder-surfing proof graphical password authentication model for mobile devices

T joo Fong, A Abdullah, NZ Jhanjhi… - … Journal of Advanced …, 2019 - researchgate.net
Swiftness, simplicity, and security is crucial for mobile device authentication. Currently, most
mobile devices are protected by a six pin numerical passcode authentication layer which is …

On the accuracy of eye gaze-driven classifiers for predicting image content familiarity in graphical passwords

A Constantinides, M Belk, C Fidas… - Proceedings of the 27th …, 2019 - dl.acm.org
Graphical passwords leverage the picture superiority effect to enhance memorability, and
reflect today's haptic users' interaction realms. Images related to users' past sociocultural …

Preventing shoulder-surfing attacks using digraph substitution rules and pass-image output feedback

LY Por, CS Ku, TF Ang - Symmetry, 2019 - mdpi.com
In this paper, we focus on methods to prevent shoulder-surfing attacks. We initially adopted
digraph substitution rules from PlayFair cipher as our proposed method. PlayFair cipher is a …