Loading…
Loading…
Hierarchy of users׳ web passwords: Perceptions, practices and susceptibilities
Taiabul Haque, S.M., Wright, Matthew, Scielzo, Shannon
Published in International journal of human-computer studies (01.12.2014)
Published in International journal of human-computer studies (01.12.2014)
Get full text
Journal Article
Loading…
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
Saadi, Zena Mohammad, Sadiq, Ahmed T., Akif, Omar Z., Farhan, Alaa K.
Published in Electronics (Basel) (01.08.2024)
Published in Electronics (Basel) (01.08.2024)
Get full text
Journal Article
Loading…
Contributions to empirical analysis of keystroke dynamics in passwords
Montalvão, Jugurta, Freire, Eduardo O., Bezerra Jr, Murilo A., Garcia, Rodolfo
Published in Pattern recognition letters (15.01.2015)
Published in Pattern recognition letters (15.01.2015)
Get full text
Journal Article
Loading…
Loading…
SLOW HASHING SPEED AS A PROTECTION FOR WEAK PASSWORDS
Carter, Anthony, Johnson, Richard
Published in International Journal of Advanced Engineering and Science (01.06.2020)
Get full text
Published in International Journal of Advanced Engineering and Science (01.06.2020)
Journal Article
Loading…
Loading…
Measuring Neuromuscular Electrophysiological Activities to Decode HD-sEMG Biometrics for Cross-Application Discrepant Personal Identification With Unknown Identities
Jiang, Xinyu, Liu, Xiangyu, Fan, Jiahao, Ye, Xinming, Dai, Chenyun, Clancy, Edward A., Chen, Wei
Published in IEEE transactions on instrumentation and measurement (2022)
Published in IEEE transactions on instrumentation and measurement (2022)
Get full text
Journal Article
Loading…
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection
Ray, Palash, Giri, Debasis, Meng, Weizhi, Hore, Soumyadeep
Published in Multimedia tools and applications (01.06.2024)
Published in Multimedia tools and applications (01.06.2024)
Get full text
Journal Article
Loading…
The influence of emotion on keyboard typing: an experimental study using visual stimuli
Lee, Po-Ming, Tsui, Wei-Hsuan, Hsiao, Tzu-Chien
Published in Biomedical engineering online (20.06.2014)
Published in Biomedical engineering online (20.06.2014)
Get full text
Journal Article
Loading…
Loading…
Recognizing Keystrokes Using WiFi Devices
Ali, Kamran, Liu, Alex X., Wei Wang, Shahzad, Muhammad
Published in IEEE journal on selected areas in communications (01.05.2017)
Published in IEEE journal on selected areas in communications (01.05.2017)
Get full text
Journal Article
Loading…
Exploring new graphical passwords by graph set-colorings subject to constraint sets
Hui Sun, Xiaohui Zhang, Bing Yao, Jingwen Li, Guanghui Yan
Published in 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC) (01.10.2017)
Published in 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC) (01.10.2017)
Get full text
Conference Proceeding
Loading…
Effects of culture on graphical password image selection and design
Mohamed, Mona, Chakraborty, Joyram, Pillutla, Sharma
Published in Journal of systems and information technology (15.05.2020)
Published in Journal of systems and information technology (15.05.2020)
Get full text
Journal Article
Loading…
Towards Cognitive Authentication for Smart Healthcare Applications
Sodhro, Ali Hassan, Sennersten, Charlotte, Ahmad, Awais
Published in Sensors (Basel, Switzerland) (09.03.2022)
Published in Sensors (Basel, Switzerland) (09.03.2022)
Get full text
Journal Article
Loading…
Cancelable HD-SEMG Biometric Identification via Deep Feature Learning
Fan, Jiahao, Jiang, Xinyu, Liu, Xiangyu, Zhao, Xian, Ye, Xinming, Dai, Chenyun, Akay, Metin, Chen, Wei
Published in IEEE journal of biomedical and health informatics (01.04.2022)
Published in IEEE journal of biomedical and health informatics (01.04.2022)
Get full text
Journal Article
Loading…
ECG Authentication for Mobile Devices
Arteaga-Falconi, Juan Sebastian, Al Osman, Hussein, El Saddik, Abdulmotaleb
Published in IEEE transactions on instrumentation and measurement (01.03.2016)
Published in IEEE transactions on instrumentation and measurement (01.03.2016)
Get full text
Journal Article
Loading…
Comparing experts’ and users’ perspectives on the use of password workarounds and the risk of data breaches
Rooney, Michael J, Levy, Yair, Li, Wei, Kumar, Ajoy
Published in Information and computer security (29.04.2025)
Published in Information and computer security (29.04.2025)
Get full text
Journal Article
Loading…
Loading…