Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

[HTML][HTML] Usable Security: A Systematic Literature Review

F Di Nocera, G Tempestini, M Orsini - Information, 2023 - mdpi.com
Usable security involves designing security measures that accommodate users' needs and
behaviors. Balancing usability and security poses challenges: the more secure the systems …

Enhancing the security of FinTech applications with map-based graphical password authentication

W Meng, L Zhu, W Li, J Han, Y Li - Future Generation Computer Systems, 2019 - Elsevier
With the rapid development of information technology (IT) in financial industry, financial
technology (FinTech) has become an emerging area for enterprises and organizations. Due …

User authentication protocol based on the location factor for a mobile environment

M Bartłomiejczyk, I El Fray, M Kurkowski… - IEEE …, 2022 - ieeexplore.ieee.org
The way the internet is used by billions of users around the world has been revolutionized
by mobile devices. The capabilities of smartphones are constantly growing, and the number …

Verification Grid and Map Slipping Based Graphical Password against Shoulder‐Surfing Attacks

Z Wang, L Liao, R Meng, CN Yang… - Security and …, 2022 - Wiley Online Library
Graphical password systems have received significant attention as one potential solution to
the need for more usable authentication, but graphical passwords are often considered …

A study on priming methods for graphical passwords

Z Parish, A Salehi-Abari, J Thorpe - Journal of Information Security and …, 2021 - Elsevier
Recent work suggests that a type of nudge or priming technique called the presentation
effect may potentially improve the security of PassPoints-style graphical passwords. These …

PassTag: a graphical-textual hybrid fallback authentication system

JK Han, X Bi, H Kim, SS Woo - Proceedings of the 15th ACM Asia …, 2020 - dl.acm.org
Designing a fallback authentication mechanism that is both memorable and strong is a
challenging problem because of the trade-off between usability and security. Security …

Geographical security questions for fallback authentication

A Addas, A Salehi-Abari… - 2019 17th international …, 2019 - ieeexplore.ieee.org
Fallback authentication is the backup authentication method used when the primary
authentication method (eg, passwords, biometrics, etc.) fails. Currently, widely-deployed …

TMGMap: designing touch movement-based geographical password authentication on smartphones

W Meng, Z Liu - Information Security Practice and Experience: 14th …, 2018 - Springer
Although textual passwords are the most widely adopted authentication method, they are
vulnerable to many known limitations. Graphical password is considered as one alternative …

Generating security questions for better protection of user privacy

A Anvari, L Pan, X Zheng - International Journal of Computers and …, 2020 - Taylor & Francis
Cyber threats to identity prevail. One of the most common forms of authentication, which
most of the online service providers require users to provide a username and preset …