Visually impaired smartphone users are more vulnerable to cyber attacks such as visual/oral eavesdropping and shoulder surfing. One of the prime reasons is that these users are soft …
S Hanif, F Sohail, AT Shehrbano… - Editorial Preface From …, 2019 - researchgate.net
In globalization of information, internet has played a vital role by providing an easy and fast access of information and systems to remote users. However, with ease for authentic users …
GC Yang - Journal of Information Processing Systems, 2020 - koreascience.kr
The personal authentication technique is an essential tool in this complex and modern digital information society. Traditionally, the most general mechanism of personal …
BB Ahamed, S Hariharan - International Journal of Security and Its …, 2012 - earticle.net
Mostly user select password that is predictable. This happens with both graphical and text based passwords. Users tend to choose memorable password, unfortunately it means that …
GC Yang, Q Hu, MR Asghar - Journal of information security and …, 2022 - Elsevier
With the widespread popularity of smartphones and mobile applications, they have gradually penetrated and are widely used in our daily lives, eg, we use them for online …
P Andriotis, M Kirby, A Takasu - International Conference on Human …, 2022 - Springer
Biometric authentication gradually replaces knowledge-based methods on mobile devices. However, Personal Identification Numbers, passcodes, and graphical password schemes …
KI Patil, J Shimpi - International Journal of Innovative Technology and …, 2013 - Citeseer
Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of …
DA Ankush, SS Husain - International Journal, 2014 - academia.edu
Today's all over Word Textual passwords are the most commonly used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social …
P Shinde, K Shedge - International Research Journal of Engineering …, 2018 - academia.edu
Textual passwords are widely used in authentication method. Strong textual passwords are hard to memorize. To address the weakness of textual password, graphical passwords are …