Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat
Bring your own devices have become a new symbol of industrial and education institutional
culture to date. A single individual can gain access to personal data anytime at anywhere of …
culture to date. A single individual can gain access to personal data anytime at anywhere of …
EvoPass: Evolvable graphical password against shoulder-surfing attacks
The passwords for authenticating users are susceptible to shoulder-surfing attacks in which
attackers learn users' passwords through direct observations without any technical support …
attackers learn users' passwords through direct observations without any technical support …
Secure authentication mechanism for resistance to password attacks
S Subangan, V Senthooran - … on Advances in ICT for Emerging …, 2019 - ieeexplore.ieee.org
Authentication is a process that provides access control of any type of computing
applications by inspecting the user's identification with the database of authorized users …
applications by inspecting the user's identification with the database of authorized users …
Graphical password-based user authentication with free-form doodles
M Martinez-Diaz, J Fierrez… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
User authentication using simple gestures is now common in portable devices. In this work,
authentication with free-form sketches is studied. Verification systems using dynamic time …
authentication with free-form sketches is studied. Verification systems using dynamic time …
BioTouchPass: Handwritten passwords for touchscreen biometrics
R Tolosana, R Vera-Rodriguez… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This work enhances traditional authentication systems based on Personal Identification
Numbers (PIN) and One-Time Passwords (OTP) through the incorporation of biometric …
Numbers (PIN) and One-Time Passwords (OTP) through the incorporation of biometric …
Securing access to internet of medical things using a graphical-password-based user authentication scheme
Digital healthcare services have seen significant growth in this decade and many new
technologies have been thoroughly examined to provide efficient services through secure …
technologies have been thoroughly examined to provide efficient services through secure …
GRA-PIN: A graphical and PIN-based hybrid authentication approach for smart devices
In many smart devices and numerous digital applications, authentication mechanisms are
widely used to validate the legitimacy of users' identification. As a result of the increased use …
widely used to validate the legitimacy of users' identification. As a result of the increased use …
The DooDB graphical password database: data analysis and benchmark results
We present DooDB, a doodle database containing data from 100 users captured with a
touch screen-enabled mobile device under realistic conditions following a systematic …
touch screen-enabled mobile device under realistic conditions following a systematic …
Biometric and traditional mobile authentication techniques: Overviews and open issues
R Amin, T Gaber, G ElTaweel… - Bio-inspiring cyber security …, 2014 - Springer
Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they
provide access to other data, on cloud for example, and to services somewhere on the …
provide access to other data, on cloud for example, and to services somewhere on the …
[PDF][PDF] A hybrid graphical user authentication scheme in mobile cloud computing environments
KHA Al-Shqeerat, KI Abuzanouneh - International Journal of …, 2021 - core.ac.uk
User authentication is a critical security requirement for accessing resources in cloud
computing systems. A text-based password is a standard user authentication way and it is …
computing systems. A text-based password is a standard user authentication way and it is …