Reimagining Authentication: A User-Centric Two-Factor Authentication with Personalized Image Verification
As digital ecosystems burgeon, the imperative to fortify user authentication methods
intensifies. This paper introduces a novel two-factor authentication system designed to …
intensifies. This paper introduces a novel two-factor authentication system designed to …
A Systematic Review of Graphical PasswordMethods Resistant to Shoulder-surfing Attacks
Graphical passwords have emerged as an alternative to traditionalalphanumeric passwords,
offering potentially better memorability. However, they are often vulnerable to shoulder …
offering potentially better memorability. However, they are often vulnerable to shoulder …
Usability Study on Textual and Graphical Passwords
AB Sakpere, TB Ologundudu - Proceedings of the Nigerian …, 2021 - nasjournal.org.ng
One of the most common methods used for authentication are passwords, in particular
textual passwords. However, maintaining multiple textual passwords across various …
textual passwords. However, maintaining multiple textual passwords across various …
The Art of Deception: Novel Graphical User Authentication Scheme Using Illusion Images
User authentication is a crucial component of information security and can be accomplished
through various ways. Strong text-based password authentication techniques have been …
through various ways. Strong text-based password authentication techniques have been …