Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat

MH Au, K Liang, JK Liu, R Lu, J Ning - Future Generation Computer …, 2018 - Elsevier
Bring your own devices have become a new symbol of industrial and education institutional
culture to date. A single individual can gain access to personal data anytime at anywhere of …

EvoPass: Evolvable graphical password against shoulder-surfing attacks

X Yu, Z Wang, Y Li, L Li, WT Zhu, L Song - Computers & Security, 2017 - Elsevier
The passwords for authenticating users are susceptible to shoulder-surfing attacks in which
attackers learn users' passwords through direct observations without any technical support …

Secure authentication mechanism for resistance to password attacks

S Subangan, V Senthooran - … on Advances in ICT for Emerging …, 2019 - ieeexplore.ieee.org
Authentication is a process that provides access control of any type of computing
applications by inspecting the user's identification with the database of authorized users …

Graphical password-based user authentication with free-form doodles

M Martinez-Diaz, J Fierrez… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
User authentication using simple gestures is now common in portable devices. In this work,
authentication with free-form sketches is studied. Verification systems using dynamic time …

BioTouchPass: Handwritten passwords for touchscreen biometrics

R Tolosana, R Vera-Rodriguez… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This work enhances traditional authentication systems based on Personal Identification
Numbers (PIN) and One-Time Passwords (OTP) through the incorporation of biometric …

Securing access to internet of medical things using a graphical-password-based user authentication scheme

MA Khan, IU Din, A Almogren - Sustainability, 2023 - mdpi.com
Digital healthcare services have seen significant growth in this decade and many new
technologies have been thoroughly examined to provide efficient services through secure …

GRA-PIN: A graphical and PIN-based hybrid authentication approach for smart devices

N Kausar, IU Din, MA Khan, A Almogren, BS Kim - Sensors, 2022 - mdpi.com
In many smart devices and numerous digital applications, authentication mechanisms are
widely used to validate the legitimacy of users' identification. As a result of the increased use …

The DooDB graphical password database: data analysis and benchmark results

M Martinez-Diaz, J Fierrez, J Galbally - IEEE Access, 2013 - ieeexplore.ieee.org
We present DooDB, a doodle database containing data from 100 users captured with a
touch screen-enabled mobile device under realistic conditions following a systematic …

Biometric and traditional mobile authentication techniques: Overviews and open issues

R Amin, T Gaber, G ElTaweel… - Bio-inspiring cyber security …, 2014 - Springer
Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they
provide access to other data, on cloud for example, and to services somewhere on the …

[PDF][PDF] A hybrid graphical user authentication scheme in mobile cloud computing environments

KHA Al-Shqeerat, KI Abuzanouneh - International Journal of …, 2021 - core.ac.uk
User authentication is a critical security requirement for accessing resources in cloud
computing systems. A text-based password is a standard user authentication way and it is …