Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks
The rapid advancement of information technology (IT) has given rise to a new era of efficient
and fast communication and transactions. However, the increasing adoption of and reliance …
and fast communication and transactions. However, the increasing adoption of and reliance …
Prevention of shoulder-surfing attacks using shifting condition using digraph substitution rules
Graphical passwords are implemented as an alternative scheme to replace alphanumeric
passwords to help users to memorize their password. However, most of the graphical …
passwords to help users to memorize their password. However, most of the graphical …
Enhancing graphical password authentication system with deep learning-based arabic digit recognition
AF Rasheed, M Zarkoosh, FR Elia - International Journal of Information …, 2024 - Springer
The purpose of this research paper is to introduce a new graphical password system that
combines the strengths of traditional passwords, such as flexibility, with the benefits of …
combines the strengths of traditional passwords, such as flexibility, with the benefits of …
Secure CAPTCHA by Genetic Algorithm (GA) and Multi-Layer Perceptron (MLP)
SS Chaeikar, FM Asl, S Yazdanpanah, M Zamani… - 2023 - preprints.org
To achieve an acceptable level of security on the web, the Completely Automatic Public
Turing test to tell Computer and Human Apart (CAPTCHA) was introduced as a tool to …
Turing test to tell Computer and Human Apart (CAPTCHA) was introduced as a tool to …
Secure CAPTCHA by Genetic Algorithm (GA) and Multi-Layer Perceptron (MLP)
To achieve an acceptable level of security on the web, the Completely Automatic Public
Turing test to tell Computer and Human Apart (CAPTCHA) was introduced as a tool to …
Turing test to tell Computer and Human Apart (CAPTCHA) was introduced as a tool to …
A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments
B Lewis, P Kirupaharan, TM Ranalli… - ACM Transactions on …, 2024 - dl.acm.org
Current computing device authentication often presents accessibility barriers for people with
upper extremity impairments (UEI). In this article, we present a framework called Accessible …
upper extremity impairments (UEI). In this article, we present a framework called Accessible …
[PDF][PDF] Pass Point Selection Of Automatic Graphical Password Authentication Technique Based On Histogram Method
Graphical passwords, as opposed to textual passwords, require the user to pick pictures or
draw symbols rather than input written letters. They are an option that may be explored in …
draw symbols rather than input written letters. They are an option that may be explored in …
Systematic Literature Review of Cybersecurity and User Experience
This research study presents a Systematic Literature Review (SLR) exploring the
convergence of Cybersecurity and User Experience (UX) fields over the five-year period …
convergence of Cybersecurity and User Experience (UX) fields over the five-year period …
[PDF][PDF] Secure CAPTCHA by Genetic Algorithm (GA) and Multi-Layer Perceptron (MLP). Electronics 2023, 12, 4084
S Shojae Chaeikar, F Mirzaei Asl, S Yazdanpanah… - 2023 - pdfs.semanticscholar.org
To achieve an acceptable level of security on the web, the Completely Automatic Public
Turing test to tell Computer and Human Apart (CAPTCHA) was introduced as a tool to …
Turing test to tell Computer and Human Apart (CAPTCHA) was introduced as a tool to …
Graphical Password Authentication Using Decentralized Single-Sign-On
RD Shinde, KR Jathar, AD Pardeshi… - … World Conference on …, 2023 - ieeexplore.ieee.org
Authentication is a crucial process that verifies the identity of an individual or system seeking
access to resources or services. Password-based authentication systems, which are the …
access to resources or services. Password-based authentication systems, which are the …