User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shop** …

Recent trends in user authentication–a survey

SW Shah, SS Kanhere - IEEE access, 2019 - ieeexplore.ieee.org
Recent advancements in technology have led to profusion of personal computing devices,
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …

[PDF][PDF] A systematic literature review of graphical password schemes

TI Shammee, T Akter, M Mou… - Journal of Computing …, 2020 - researchgate.net
Graphical passwords are an alternative to traditional alphanumeric passwords and can
similarly be used to secure online accounts. The widely used alphanumeric passwords have …

Better, funner, stronger: a gameful approach to nudge people into making less predictable graphical password choices

GE Raptis, C Katsini, AJL Cen… - Proceedings of the …, 2021 - dl.acm.org
Graphical user authentication (GUA) is a common alternative to text-based user
authentication, where people are required to draw graphical passwords on background …

A systematic review of graphical password methods resistant to shoulder-surfing attacks

F Binbeshr, KC Siong, L Yee, M Imam… - International Journal of …, 2025 - Springer
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …

Passpage: graphical password authentication scheme based on web browsing records

X Chu, H Sun, Z Chen - Financial Cryptography and Data Security: FC …, 2020 - Springer
This paper proposes a two-factor graphical password authentication scheme, PassPage,
which is suitable for website authentication with enhanced security. It leverages the implicit …

A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments

B Lewis, P Kirupaharan, TM Ranalli… - ACM Transactions on …, 2024 - dl.acm.org
Current computing device authentication often presents accessibility barriers for people with
upper extremity impairments (UEI). In this article, we present a framework called Accessible …

Shoulder surf resistant screen locking for smartphones: a review of fifty non-biometric methods

H Aris, WF Yaakob - 2018 IEEE Conference on Application …, 2018 - ieeexplore.ieee.org
With a lot of personal information being stored in the smartphones nowadays, there is an
urgent need to protect them from unauthorised access. The first line of defense of a …

Smartgp: A framework for a two-factor graphical password authentication using smart devices

P Ray, R Mukherjee, D Giri, M Sasmal - International Conference on …, 2022 - Springer
Authentication procedures are employed to verify and validate user's identification on
various smart devices and a variety of digital apps. Alphanumeric and Personal Identification …

Simple shape-based touch behavioral biometrics authentication for smart mobiles

G Abbas, SR Humayoun, R AlTarawneh… - Proceedings of the 2018 …, 2018 - dl.acm.org
One of the main concerns during usage of the current smart mobile devices in public is the
vulnerability of password hacking by shoulder-suffering or smudge attack. The traditional …