[PDF][PDF] Pass-go: A proposal to improve the usability of graphical passwords.

H Tao, C Adams - Int. J. Netw. Secur., 2008 - Citeseer
Inspired by an old Chinese game, Go, we have designed a new graphical password
scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a …

[BOOK][B] Behavioral biometrics: a remote access approach

K Revett - 2008 - books.google.com
With the advent of the internet as a medium for performing business transactions, the need
for a secure communication channel has never been more paramount. The study of …

[PDF][PDF] Pass-Go, a new graphical password scheme

H Tao - 2006 - ruor.uottawa.ca
Inspired by an old Chinese game, Go, we have designed a new graphical password
scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a …

Guessing attacks on user-generated gesture passwords

C Liu, GD Clark, J Lindqvist - Proceedings of the ACM on Interactive …, 2017 - dl.acm.org
Touchscreens, the dominant input type for mobile phones, require unique authentication
solutions. Gesture passwords have been proposed as an alternative ubiquitous …

[HTML][HTML] Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica.

O Rodriguez Valdés, CM Legón… - Revista Cubana de …, 2018 - scielo.sld.cu
La autenticación es un área clave en la seguridad de la información. En la modernidad los
usuarios necesitan acceder a muchos servicios digitales imprescindibles para su vida …

[PDF][PDF] A multi-grid graphical password scheme

K Chalkias, A Alexiadis… - Proceedings of the Sixth …, 2006 - academia.edu
The vast majority of computer and communication systems use passwords in order to
identify users. Unfortunately, in ubiquitous alpha-numeric password schemes, users tend to …

[PDF][PDF] Comparing the proof by knowledge authentication techniques

S Gkarafli, AA Economides - International Journal of Computer …, 2011 - conta.uom.gr
This paper presents a survey of proof by knowledge authentication techniques (text
passwords, visual passwords and graphical passwords). Both new methods are more …

Patrones en el orden de los clics y su influencia en la debilidad de las claves en la técnica de autenticacion gráfica passpoints

OR Valdés, CM Legón, R Socorro… - Serie Científica de la …, 2019 - dialnet.unirioja.es
Para garantizar la seguridad y privacidad de acceso a los sistemas digitales,
tradicionalmente se han utilizado las contraseñas alfanuméricas. Los usuarios casi siempre …

Modelling the security of recognition-based graphical password schemes

R English - 2012 - theses.gla.ac.uk
Recognition-based graphical passwords are a suggested alternative authentication
mechanism which have received substantial attention in research literature. The literature …

User dynamics in graphical authentication systems

K Revett, H Jahankhani, ST de Magalhães… - Global E-Security: 4th …, 2008 - Springer
In this paper, a graphical authentication system is presented which is based on a matching
scheme. The user is required to match up thumbnail graphical images that belong to a …