Loading…
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
Saadi, Zena Mohammad, Sadiq, Ahmed T., Akif, Omar Z., Farhan, Alaa K.
Published in Electronics (Basel) (01.08.2024)
Published in Electronics (Basel) (01.08.2024)
Get full text
Journal Article
Loading…
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection
Ray, Palash, Giri, Debasis, Meng, Weizhi, Hore, Soumyadeep
Published in Multimedia tools and applications (01.06.2024)
Published in Multimedia tools and applications (01.06.2024)
Get full text
Journal Article
Loading…
Exploring new graphical passwords by graph set-colorings subject to constraint sets
Hui Sun, Xiaohui Zhang, Bing Yao, Jingwen Li, Guanghui Yan
Published in 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC) (01.10.2017)
Published in 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC) (01.10.2017)
Get full text
Conference Proceeding
Loading…
Applying graph set-labellings having constraint sets towards new graphical passwords
Bing Yao, Hui Sun, Xiaohui Zhang, Jingwen Li, Meimei Zhao
Published in 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC) (01.10.2017)
Published in 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC) (01.10.2017)
Get full text
Conference Proceeding
Loading…
Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords
Aljahdali, Hani Moaiteq, Poet, Ron
Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.09.2014)
Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.09.2014)
Get full text
Conference Proceeding
Loading…
“I Recall this Picture”: Understanding Picture Password Selections based on Users’ Sociocultural Experiences
Constantinides, Argyris, Fidas, Christos, Belk, Marios, Pitsillides, Andreas
Published in 2019 IEEE WIC ACM International Conference on Web Intelligence (WI) (14.10.2019)
Published in 2019 IEEE WIC ACM International Conference on Web Intelligence (WI) (14.10.2019)
Get full text
Conference Proceeding
Loading…
A New Password Authentication Mechanism Using 2D Shapes
Fayyadh, Bilal Eid, Mansour, Khalid, Mahmoud, Khaled W.
Published in 2018 8th International Conference on Computer Science and Information Technology (CSIT) (01.07.2018)
Published in 2018 8th International Conference on Computer Science and Information Technology (CSIT) (01.07.2018)
Get full text
Conference Proceeding
Loading…
A study of mnemonic image passwords
Chowdhury, Soumyadeb, Poet, Ron, Mackenzie, Lewis
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01.07.2014)
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01.07.2014)
Get full text
Conference Proceeding
Loading…
Effects of culture on graphical password image selection and design
Mohamed, Mona, Chakraborty, Joyram, Pillutla, Sharma
Published in Journal of systems and information technology (15.05.2020)
Published in Journal of systems and information technology (15.05.2020)
Get full text
Journal Article
Loading…
Testing Design for Pixel Value Graphical Password Scheme on Image Specimens
Published in International journal of recent technology and engineering
(17.09.2019)
Get full text
Journal Article
Loading…
Loading…
Loading…
Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance
Wang, Ruxin, Huang, Long, Wang, Chen
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2023)
Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2023)
Get full text
Conference Proceeding
Loading…
ECG Authentication for Mobile Devices
Arteaga-Falconi, Juan Sebastian, Al Osman, Hussein, El Saddik, Abdulmotaleb
Published in IEEE transactions on instrumentation and measurement (01.03.2016)
Published in IEEE transactions on instrumentation and measurement (01.03.2016)
Get full text
Journal Article
Loading…
Loading…
Loading…
Exploring the guessability of hand drawn images based on cultural characteristics
Jebriel, Salem, Poet, Ron
Published in 2014 6th International Conference on Computer Science and Information Technology (CSIT) (01.03.2014)
Published in 2014 6th International Conference on Computer Science and Information Technology (CSIT) (01.03.2014)
Get full text
Conference Proceeding
Loading…
Network Security: Authentication using Mixed Mode Approach
Jangale, Smita, Mane, Dashrath
Published in International Journal of Computer Technology and Applications (01.03.2013)
Get full text
Published in International Journal of Computer Technology and Applications (01.03.2013)
Journal Article