User authentication on mobile devices: Approaches, threats and trends
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shop** …
to enjoy the anytime and anywhere various applications such as the online shop** …
Recent trends in user authentication–a survey
Recent advancements in technology have led to profusion of personal computing devices,
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …
[PDF][PDF] A systematic literature review of graphical password schemes
TI Shammee, T Akter, M Mou… - Journal of Computing …, 2020 - researchgate.net
Graphical passwords are an alternative to traditional alphanumeric passwords and can
similarly be used to secure online accounts. The widely used alphanumeric passwords have …
similarly be used to secure online accounts. The widely used alphanumeric passwords have …
Better, funner, stronger: a gameful approach to nudge people into making less predictable graphical password choices
Graphical user authentication (GUA) is a common alternative to text-based user
authentication, where people are required to draw graphical passwords on background …
authentication, where people are required to draw graphical passwords on background …
A systematic review of graphical password methods resistant to shoulder-surfing attacks
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …
passwords, offering potentially better memorability. However, they are often vulnerable to …
Passpage: graphical password authentication scheme based on web browsing records
X Chu, H Sun, Z Chen - Financial Cryptography and Data Security: FC …, 2020 - Springer
This paper proposes a two-factor graphical password authentication scheme, PassPage,
which is suitable for website authentication with enhanced security. It leverages the implicit …
which is suitable for website authentication with enhanced security. It leverages the implicit …
A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments
B Lewis, P Kirupaharan, TM Ranalli… - ACM Transactions on …, 2024 - dl.acm.org
Current computing device authentication often presents accessibility barriers for people with
upper extremity impairments (UEI). In this article, we present a framework called Accessible …
upper extremity impairments (UEI). In this article, we present a framework called Accessible …
Shoulder surf resistant screen locking for smartphones: a review of fifty non-biometric methods
H Aris, WF Yaakob - 2018 IEEE Conference on Application …, 2018 - ieeexplore.ieee.org
With a lot of personal information being stored in the smartphones nowadays, there is an
urgent need to protect them from unauthorised access. The first line of defense of a …
urgent need to protect them from unauthorised access. The first line of defense of a …
Smartgp: A framework for a two-factor graphical password authentication using smart devices
Authentication procedures are employed to verify and validate user's identification on
various smart devices and a variety of digital apps. Alphanumeric and Personal Identification …
various smart devices and a variety of digital apps. Alphanumeric and Personal Identification …
Simple shape-based touch behavioral biometrics authentication for smart mobiles
One of the main concerns during usage of the current smart mobile devices in public is the
vulnerability of password hacking by shoulder-suffering or smudge attack. The traditional …
vulnerability of password hacking by shoulder-suffering or smudge attack. The traditional …