BraillePassword: accessible web authentication technique on touchscreen devices

M Alnfiai, S Sampalli - Journal of Ambient Intelligence and Humanized …, 2019 - Springer
Blind people use smartphone devices to perform many daily activities like mobile banking,
social media, shopping, health care, etc. While smartphone devices are essential tools for …

VIBI: a braille inspired password entry model to assist person with visual impairments

V Balaji, KS Kuppusamy, S Afzal - … 2017, Chennai, India, December 20-22 …, 2018 - Springer
Visually impaired smartphone users are more vulnerable to cyber attacks such as visual/oral
eavesdropping and shoulder surfing. One of the prime reasons is that these users are soft …

[PDF][PDF] A new shoulder surfing and mobile key-logging resistant graphical password scheme for smart-held devices

S Hanif, F Sohail, AT Shehrbano… - Editorial Preface From …, 2019 - researchgate.net
In globalization of information, internet has played a vital role by providing an easy and fast
access of information and systems to remote users. However, with ease for authentic users …

Next-generation personal authentication scheme based on EEG signal and deep learning

GC Yang - Journal of Information Processing Systems, 2020 - koreascience.kr
The personal authentication technique is an essential tool in this complex and modern
digital information society. Traditionally, the most general mechanism of personal …

Integration of Sound Signature Authentication System

BB Ahamed, S Hariharan - International Journal of Security and Its …, 2012 - earticle.net
Mostly user select password that is predictable. This happens with both graphical and text
based passwords. Users tend to choose memorable password, unfortunately it means that …

TIM: Secure and usable authentication for smartphones

GC Yang, Q Hu, MR Asghar - Journal of information security and …, 2022 - Elsevier
With the widespread popularity of smartphones and mobile applications, they have
gradually penetrated and are widely used in our daily lives, eg, we use them for online …

Bu-dash: a universal and dynamic graphical password scheme

P Andriotis, M Kirby, A Takasu - International Conference on Human …, 2022 - Springer
Biometric authentication gradually replaces knowledge-based methods on mobile devices.
However, Personal Identification Numbers, passcodes, and graphical password schemes …

[PDF][PDF] A graphical password using token, biometric, knowledge based authentication system for mobile devices

KI Patil, J Shimpi - International Journal of Innovative Technology and …, 2013 - Citeseer
Passwords provide security mechanism for authentication and protection services against
unwanted access to resources. A graphical based password is one promising alternatives of …

[PDF][PDF] Authentication scheme for shoulder surfing using graphical and pair based scheme

DA Ankush, SS Husain - International Journal, 2014 - academia.edu
Today's all over Word Textual passwords are the most commonly used for authentication.
But textual passwords are vulnerable to eves dropping, dictionary attacks, social …

[PDF][PDF] PassMatrix-An authentication system to resist shoulder surfing attacks

P Shinde, K Shedge - International Research Journal of Engineering …, 2018 - academia.edu
Textual passwords are widely used in authentication method. Strong textual passwords are
hard to memorize. To address the weakness of textual password, graphical passwords are …