Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

LA Adebimpe, IO Ng, MYI Idris, M Okmi, CS Ku… - Applied Sciences, 2023 - mdpi.com
The rapid advancement of information technology (IT) has given rise to a new era of efficient
and fast communication and transactions. However, the increasing adoption of and reliance …

A systematic review of graphical password methods resistant to shoulder-surfing attacks

F Binbeshr, KC Siong, L Yee, M Imam… - International Journal of …, 2025 - Springer
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …

Password based authentication for web based graphics computing services retrieval in cloud

ES Alkhalifah - Multimedia Tools and Applications, 2024 - Springer
In the global environment privacy and security issues were critical to handle the huge
number of participants. Many security-based research works have been undertaken in the …

Design, Analysis, and Implementation of a Two-factor Authentication Scheme using Graphical Password

KM Quadry, A Govardhan… - International Journal of …, 2021 - search.proquest.com
With the increase in the number of e-services, there is a sharp increase in online financial
transactions these days. These services require a strong authentication scheme to validate …

Smartgp: A framework for a two-factor graphical password authentication using smart devices

P Ray, R Mukherjee, D Giri, M Sasmal - International Conference on …, 2022 - Springer
Authentication procedures are employed to verify and validate user's identification on
various smart devices and a variety of digital apps. Alphanumeric and Personal Identification …

PASSWORD SECURITY, AN ANALYSIS OF AUTHENTICATION METHODS

W Safder - 2024 - diva-portal.org
An era in which transactions and communication are quick and easy owing to fast-growing
IT technology has commenced nowadays. Because of the extensive use of IT and its wide …

Principles for designing authentication mechanisms for young children: lessons learned from KidzPass

K Renaud, M Volkamer, P Mayer… - AIS Transactions on …, 2021 - aisel.aisnet.org
Young children routinely authenticate themselves with alphanumeric passwords but are
probably not ready to use such passwords due to their emerging literacy and immaturity …

Reimagining Authentication: A User-Centric Two-Factor Authentication with Personalized Image Verification

E Djeki, J Dégila, MH Alhassan - 2024 ASU International …, 2024 - ieeexplore.ieee.org
As digital ecosystems burgeon, the imperative to fortify user authentication methods
intensifies. This paper introduces a novel two-factor authentication system designed to …

PassFile: Graphical Password Authentication Based on File Browsing Records

HC Fu, W Li, Y Wang - International Conference on Machine Learning for …, 2023 - Springer
With the rapid growth of smartphone shipments, it has become a necessity to safeguard the
mobile devices from unauthorized access (eg, in case of stolen or lost). To complement …

Application of Multi-Modal Neural Networks in Verifying the Authenticity of News Text and Images.

F Li, M Xu, MM Rosli - Traitement du Signal, 2023 - search.ebscohost.com
In the digital information era, the authenticity of news media is crucial for sha** public
opinion and maintaining social stability. The verification of authenticity, especially in news …