[PDF][PDF] Pass-go: A proposal to improve the usability of graphical passwords.
H Tao, C Adams - Int. J. Netw. Secur., 2008 - Citeseer
Inspired by an old Chinese game, Go, we have designed a new graphical password
scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a …
scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a …
[BOOK][B] Behavioral biometrics: a remote access approach
K Revett - 2008 - books.google.com
With the advent of the internet as a medium for performing business transactions, the need
for a secure communication channel has never been more paramount. The study of …
for a secure communication channel has never been more paramount. The study of …
[PDF][PDF] Pass-Go, a new graphical password scheme
H Tao - 2006 - ruor.uottawa.ca
Inspired by an old Chinese game, Go, we have designed a new graphical password
scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a …
scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a …
Guessing attacks on user-generated gesture passwords
C Liu, GD Clark, J Lindqvist - Proceedings of the ACM on Interactive …, 2017 - dl.acm.org
Touchscreens, the dominant input type for mobile phones, require unique authentication
solutions. Gesture passwords have been proposed as an alternative ubiquitous …
solutions. Gesture passwords have been proposed as an alternative ubiquitous …
[HTML][HTML] Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica.
O Rodriguez Valdés, CM Legón… - Revista Cubana de …, 2018 - scielo.sld.cu
La autenticación es un área clave en la seguridad de la información. En la modernidad los
usuarios necesitan acceder a muchos servicios digitales imprescindibles para su vida …
usuarios necesitan acceder a muchos servicios digitales imprescindibles para su vida …
[PDF][PDF] A multi-grid graphical password scheme
K Chalkias, A Alexiadis… - Proceedings of the Sixth …, 2006 - academia.edu
The vast majority of computer and communication systems use passwords in order to
identify users. Unfortunately, in ubiquitous alpha-numeric password schemes, users tend to …
identify users. Unfortunately, in ubiquitous alpha-numeric password schemes, users tend to …
[PDF][PDF] Comparing the proof by knowledge authentication techniques
S Gkarafli, AA Economides - International Journal of Computer …, 2011 - conta.uom.gr
This paper presents a survey of proof by knowledge authentication techniques (text
passwords, visual passwords and graphical passwords). Both new methods are more …
passwords, visual passwords and graphical passwords). Both new methods are more …
Patrones en el orden de los clics y su influencia en la debilidad de las claves en la técnica de autenticacion gráfica passpoints
OR Valdés, CM Legón, R Socorro… - Serie Científica de la …, 2019 - dialnet.unirioja.es
Para garantizar la seguridad y privacidad de acceso a los sistemas digitales,
tradicionalmente se han utilizado las contraseñas alfanuméricas. Los usuarios casi siempre …
tradicionalmente se han utilizado las contraseñas alfanuméricas. Los usuarios casi siempre …
Modelling the security of recognition-based graphical password schemes
R English - 2012 - theses.gla.ac.uk
Recognition-based graphical passwords are a suggested alternative authentication
mechanism which have received substantial attention in research literature. The literature …
mechanism which have received substantial attention in research literature. The literature …
User dynamics in graphical authentication systems
K Revett, H Jahankhani, ST de Magalhães… - Global E-Security: 4th …, 2008 - Springer
In this paper, a graphical authentication system is presented which is based on a matching
scheme. The user is required to match up thumbnail graphical images that belong to a …
scheme. The user is required to match up thumbnail graphical images that belong to a …