Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

You are how you touch: User verification on smartphones via tapping behaviors

N Zheng, K Bai, H Huang… - 2014 IEEE 22nd …, 2014 - ieeexplore.ieee.org
Smartphone users have their own unique behavioral patterns when tapping on the touch
screens. These personal patterns are reflected on the different rhythm, strength, and angle …

Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism

S Chiasson, E Stobert, A Forget… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …

Captcha as graphical passwords—A new security primitive based on hard AI problems

BB Zhu, J Yan, G Bao, M Yang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …

oPass: A user authentication protocol resistant to password stealing and password reuse attacks

HM Sun, YH Chen, YH Lin - IEEE transactions on information …, 2011 - ieeexplore.ieee.org
Text password is the most popular form of user authentication on websites due to its
convenience and simplicity. However, users' passwords are prone to be stolen and …

Exploring touch-screen biometrics for user identification on smart phones

J Angulo, E Wästlund - Privacy and Identity Management for Life: 7th IFIP …, 2012 - Springer
The use of mobile smart devices for storing sensitive information and accessing online
services is increasing. At the same time, methods for authenticating users into their devices …

Exploiting predictability in click-based graphical passwords

PC van Oorschot, J Thorpe - Journal of Computer Security, 2011 - content.iospress.com
We provide an in-depth study of the security of click-based graphical password schemes like
PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and …

[PDF][PDF] A survey on the use of graphical passwords in security.

H Gao, W Jia, F Ye, L Ma - J. Softw., 2013 - jsoftware.us
Beginning around 1996, numerous graphical password schemes have been proposed,
motivated by improving password usability and security, two key factors in password scheme …

Better, funner, stronger: a gameful approach to nudge people into making less predictable graphical password choices

GE Raptis, C Katsini, AJL Cen… - Proceedings of the …, 2021 - dl.acm.org
Graphical user authentication (GUA) is a common alternative to text-based user
authentication, where people are required to draw graphical passwords on background …