[HTML][HTML] A Review on Secure Authentication Mechanisms for Mobile Security

SSU Hasan, A Ghani, A Daud, H Akbar, MF Khan - Sensors, 2025 - mdpi.com
Cybersecurity, complimenting authentication, has become the backbone of the Internet of
Things. In the authentication process, the word authentication is of the utmost importance, as …

Advancements in User Security: Enhancing Usability with Graphical Password Authentication

SR Naik, SS Vasudeva, K Shrilakshmi… - … on Intelligent Data …, 2024 - ieeexplore.ieee.org
Text-based password authentication is a common method used to verify the identity of users
who are trying to access a secure system or service. In order to use this authentication …

[CITATION][C] Review on User Authentication on Mobile Devices

UA Gimba, NAM Ariffin - Journal of Advanced Research in …, 2024 - semarakilmu.com.my
Mobile devices have made more easier and great convenience in the 21 st century, which
gives users freedom to gain access anytime, anywhere to numerous applications with the …