Enhancing the security of FinTech applications with map-based graphical password authentication
With the rapid development of information technology (IT) in financial industry, financial
technology (FinTech) has become an emerging area for enterprises and organizations. Due …
technology (FinTech) has become an emerging area for enterprises and organizations. Due …
Emerging NUI-based methods for user authentication: A new taxonomy and survey
As the convenience and cost benefits of natural user interface (NUI) technologies are
hastening their wide adoption, computing devices equipped with such interfaces are …
hastening their wide adoption, computing devices equipped with such interfaces are …
THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network
SDN has provided significant convenience for network providers and operators in cloud
computing. Such a great advantage is extending to the Internet of Things network. However …
computing. Such a great advantage is extending to the Internet of Things network. However …
Nudging with construal level theory to improve online password use and intended password choice: a security-usability tradeoff perspective
Purpose The purpose of this paper is to focus on a potential tradeoff between security and
usability in people's use of online passwords–in general, complex passwords are secure …
usability in people's use of online passwords–in general, complex passwords are secure …
G-RAT| a novel graphical randomized authentication technique for consumer smart devices
User authentication is the process that is exercised millions of times around the globe by
using different techniques and methods. The most prominent way of authentication is …
using different techniques and methods. The most prominent way of authentication is …
[PDF][PDF] Security and user interface usability of graphical authentication systems–A review
HU Suru, P Murano - International Journal of Engineering Trends and …, 2019 - academia.edu
Alphanumeric text and PINs continue to be the dominant authentication methods in spite of
the numerous concerns by security researchers of their inability to properly address usability …
the numerous concerns by security researchers of their inability to properly address usability …
A fractal-based authentication technique using sierpinski triangles in smart devices
The prevalence of smart devices in our day-to-day activities increases the potential threat to
our secret information. To counter these threats like unauthorized access and misuse of …
our secret information. To counter these threats like unauthorized access and misuse of …
[PDF][PDF] The coin passcode: A shoulder-surfing proof graphical password authentication model for mobile devices
T joo Fong, A Abdullah, NZ Jhanjhi… - … Journal of Advanced …, 2019 - researchgate.net
Swiftness, simplicity, and security is crucial for mobile device authentication. Currently, most
mobile devices are protected by a six pin numerical passcode authentication layer which is …
mobile devices are protected by a six pin numerical passcode authentication layer which is …
On the accuracy of eye gaze-driven classifiers for predicting image content familiarity in graphical passwords
Graphical passwords leverage the picture superiority effect to enhance memorability, and
reflect today's haptic users' interaction realms. Images related to users' past sociocultural …
reflect today's haptic users' interaction realms. Images related to users' past sociocultural …
Preventing shoulder-surfing attacks using digraph substitution rules and pass-image output feedback
In this paper, we focus on methods to prevent shoulder-surfing attacks. We initially adopted
digraph substitution rules from PlayFair cipher as our proposed method. PlayFair cipher is a …
digraph substitution rules from PlayFair cipher as our proposed method. PlayFair cipher is a …