Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

LA Adebimpe, IO Ng, MYI Idris, M Okmi, CS Ku… - Applied Sciences, 2023 - mdpi.com
The rapid advancement of information technology (IT) has given rise to a new era of efficient
and fast communication and transactions. However, the increasing adoption of and reliance …

Password based authentication for web based graphics computing services retrieval in cloud

ES Alkhalifah - Multimedia Tools and Applications, 2024 - Springer
In the global environment privacy and security issues were critical to handle the huge
number of participants. Many security-based research works have been undertaken in the …

[PDF][PDF] Vulnerability Assessment Studies of Existing Knowledge-Based Authentication Systems: A Systematic Review

TC Adeniran, RG Jimoh, EU Abah… - … University Journal of …, 2024 - researchgate.net
In the past decades, web applications have become a vital part of our daily activities, while
hacking activities have also increased speedily. Both individuals and organizations are …

PASSWORD SECURITY, AN ANALYSIS OF AUTHENTICATION METHODS

W Safder - 2024 - diva-portal.org
An era in which transactions and communication are quick and easy owing to fast-growing
IT technology has commenced nowadays. Because of the extensive use of IT and its wide …

One Time Password Authentication for Machine Activation Monitoring System Based on Wireless Network

LKP Saputra, A Filiana, MNA Rini… - … on Electrical and …, 2023 - ieeexplore.ieee.org
Digital data in manufacturing production is helpful for companies in planning, evaluating,
and developing innovations. The Industrial Revolution 4.0 made integration between …

A Systematic Review of Graphical PasswordMethods Resistant to Shoulder-surfing Attacks

F Binbeshr, KC Siong, LY Por, M Imam, AA Al-Saggaf… - 2024 - researchsquare.com
Graphical passwords have emerged as an alternative to traditionalalphanumeric passwords,
offering potentially better memorability. However, they are often vulnerable to shoulder …

Word-Pattern: Enhancement of Usability and Security of User-Chosen Recognition Textual Password.

H Wasfi, R Stone, U Genschel - International Journal of …, 2024 - search.ebscohost.com
Abstract Knowledge-based authentication systems are the most common methods used to
verify users' identity, especially textual passwords. However, periodic changes in password …

Usability and security of recognition-based textual password

HMA Wasfi - 2024 - search.proquest.com
Abstract Knowledge-based passwords are still the most dominant authentication technique
for authentications purposes, in spite of the emergence of alternative systems such as token …

Securing Access: A Combined Approach of Cued Click Points and Text Passwords for Authentication

V Palkonda, VL Vinya, N Kolluri… - Nanotechnology …, 2024 - nano-ntp.com
Authentication is one of the most important security primitives. Alphabetic password
authentication is the most used type of authentication. It has been shown that this method …

Evaluación de las buenas prácticas de ciberseguridad en los estudiantes universitarios: un estudio en la Universidad Politécnica Salesiana sede Guayaquil

JD Torres Chávez, JA Mata Pazmiño - 2024 - dspace.ups.edu.ec
Las buenas prácticas de ciberseguridad son esenciales en los entornos universitarios, por
lo que se realizó una evaluación del nivel de conocimiento y de las buenas prácticas en …