Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Determinants of behavioral intention to mobile banking

JC Gu, SC Lee, YH Suh - Expert Systems with Applications, 2009 - Elsevier
With the improvement of mobile technologies and devices, banking users are able to
conduct banking services at anyplace and at anytime. Recently, many banks in the world …

Touch me once and i know it's you! implicit authentication based on touch screen patterns

A De Luca, A Hang, F Brudy, C Lindner… - proceedings of the …, 2012 - dl.acm.org
Password patterns, as used on current Android phones, and other shape-based
authentication schemes are highly usable and memorable. In terms of security, they are …

[KNIHA][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

PassPoints: Design and longitudinal evaluation of a graphical password system

S Wiedenbeck, J Waters, JC Birget, A Brodskiy… - International journal of …, 2005 - Elsevier
Computer security depends largely on passwords to authenticate human users. However,
users have difficulty remembering passwords over time if they choose a secure password, ie …

Net valence analysis of iris recognition technology-based FinTech

MM Al-Debei, O Hujran, AS Al-Adwan - Financial Innovation, 2024 - Springer
Iris recognition technology (IRT)-based authentication is a biometric financial technology
(FinTech) application used to automate user recognition and verification. In addition to being …

A survey of user interaction for spontaneous device association

MK Chong, R Mayrhofer, H Gellersen - ACM Computing Surveys (CSUR …, 2014 - dl.acm.org
In a wireless world, users can establish ad hoc virtual connections between devices that are
unhampered by cables. This process is known as spontaneous device association. A wide …

Authentication using graphical passwords: Effects of tolerance and image choice

S Wiedenbeck, J Waters, JC Birget, A Brodskiy… - Proceedings of the …, 2005 - dl.acm.org
Graphical passwords are an alternative to alphanumeric passwords in which users click on
images to authenticate themselves rather than type alphanumeric strings. We have …

Secure biometric authentication with de-duplication on distributed cloud storage

K Venkatachalam, P Prabu, A Almutairi… - PeerJ Computer …, 2021 - peerj.com
Cloud computing is one of the evolving fields of technology, which allows storage, access of
data, programs, and their execution over the internet with offering a variety of information …

Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing

F Mathis, JH Williamson, K Vaniea… - ACM Transactions on …, 2021 - dl.acm.org
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …