Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks
The rapid advancement of information technology (IT) has given rise to a new era of efficient
and fast communication and transactions. However, the increasing adoption of and reliance …
and fast communication and transactions. However, the increasing adoption of and reliance …
A systematic review of graphical password methods resistant to shoulder-surfing attacks
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …
passwords, offering potentially better memorability. However, they are often vulnerable to …
Password based authentication for web based graphics computing services retrieval in cloud
ES Alkhalifah - Multimedia Tools and Applications, 2024 - Springer
In the global environment privacy and security issues were critical to handle the huge
number of participants. Many security-based research works have been undertaken in the …
number of participants. Many security-based research works have been undertaken in the …
Design, Analysis, and Implementation of a Two-factor Authentication Scheme using Graphical Password
With the increase in the number of e-services, there is a sharp increase in online financial
transactions these days. These services require a strong authentication scheme to validate …
transactions these days. These services require a strong authentication scheme to validate …
Smartgp: A framework for a two-factor graphical password authentication using smart devices
Authentication procedures are employed to verify and validate user's identification on
various smart devices and a variety of digital apps. Alphanumeric and Personal Identification …
various smart devices and a variety of digital apps. Alphanumeric and Personal Identification …
PASSWORD SECURITY, AN ANALYSIS OF AUTHENTICATION METHODS
W Safder - 2024 - diva-portal.org
An era in which transactions and communication are quick and easy owing to fast-growing
IT technology has commenced nowadays. Because of the extensive use of IT and its wide …
IT technology has commenced nowadays. Because of the extensive use of IT and its wide …
Principles for designing authentication mechanisms for young children: lessons learned from KidzPass
Young children routinely authenticate themselves with alphanumeric passwords but are
probably not ready to use such passwords due to their emerging literacy and immaturity …
probably not ready to use such passwords due to their emerging literacy and immaturity …
Reimagining Authentication: A User-Centric Two-Factor Authentication with Personalized Image Verification
As digital ecosystems burgeon, the imperative to fortify user authentication methods
intensifies. This paper introduces a novel two-factor authentication system designed to …
intensifies. This paper introduces a novel two-factor authentication system designed to …
PassFile: Graphical Password Authentication Based on File Browsing Records
HC Fu, W Li, Y Wang - International Conference on Machine Learning for …, 2023 - Springer
With the rapid growth of smartphone shipments, it has become a necessity to safeguard the
mobile devices from unauthorized access (eg, in case of stolen or lost). To complement …
mobile devices from unauthorized access (eg, in case of stolen or lost). To complement …
Application of Multi-Modal Neural Networks in Verifying the Authenticity of News Text and Images.
F Li, M Xu, MM Rosli - Traitement du Signal, 2023 - search.ebscohost.com
In the digital information era, the authenticity of news media is crucial for sha** public
opinion and maintaining social stability. The verification of authenticity, especially in news …
opinion and maintaining social stability. The verification of authenticity, especially in news …