Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
Modern authentication schemes in smartphones and IoT devices: An empirical survey
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
You are how you touch: User verification on smartphones via tapping behaviors
Smartphone users have their own unique behavioral patterns when tapping on the touch
screens. These personal patterns are reflected on the different rhythm, strength, and angle …
screens. These personal patterns are reflected on the different rhythm, strength, and angle …
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …
password scheme, including usability and security evaluations, and implementation …
Captcha as graphical passwords—A new security primitive based on hard AI problems
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
oPass: A user authentication protocol resistant to password stealing and password reuse attacks
Text password is the most popular form of user authentication on websites due to its
convenience and simplicity. However, users' passwords are prone to be stolen and …
convenience and simplicity. However, users' passwords are prone to be stolen and …
Exploring touch-screen biometrics for user identification on smart phones
J Angulo, E Wästlund - Privacy and Identity Management for Life: 7th IFIP …, 2012 - Springer
The use of mobile smart devices for storing sensitive information and accessing online
services is increasing. At the same time, methods for authenticating users into their devices …
services is increasing. At the same time, methods for authenticating users into their devices …
Exploiting predictability in click-based graphical passwords
PC van Oorschot, J Thorpe - Journal of Computer Security, 2011 - content.iospress.com
We provide an in-depth study of the security of click-based graphical password schemes like
PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and …
PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and …
[PDF][PDF] A survey on the use of graphical passwords in security.
H Gao, W Jia, F Ye, L Ma - J. Softw., 2013 - jsoftware.us
Beginning around 1996, numerous graphical password schemes have been proposed,
motivated by improving password usability and security, two key factors in password scheme …
motivated by improving password usability and security, two key factors in password scheme …
Better, funner, stronger: a gameful approach to nudge people into making less predictable graphical password choices
Graphical user authentication (GUA) is a common alternative to text-based user
authentication, where people are required to draw graphical passwords on background …
authentication, where people are required to draw graphical passwords on background …