Graphical one-time password authentication

H Alsaiari - 2016 - plymouth.researchcommons.org
create long and complex passwords to protect their accounts. However, remembering such
passwords … This research has made use of the online banking context to explore the security, …

[PDF][PDF] The Usage of Password Generators to Enhance Data Security in Most Used Applications

E Halim, AH Teng, M Hebrard… - Jurnal Ilmiah Teknik …, 2023 - eprints.uad.ac.id
… people's use of password generators. The results of this research could be used to create
However, the research continued with data entry and analysis if the responses were valid. …

[PDF][PDF] Haptic-based sensible graphical password

M Orozco, B Malek, M Eid, A El Saddik - Proceedings of Virtual Concept, 2006 - Citeseer
… Firstly, psychophysical experiments provided the contextual clues involved in the haptic
perception … We generated HFVs from these hacking attempts and input them into the ANN. We …

Emotionally Engaged Neurosymbolic AI for Usable Password Generation

S Biswal - … in Data-driven Computing and Intelligent Systems, 2023 - Springer
… ) system, a novel approach for generating usable passwords. … reasoning, ideal for generating
context-aware passwords. By … password generation rules to these keywords and user input, …

A simple and secure reformation-based password scheme

M Ali, A Baloch, A Waheed, M Zareei, R Manzoor… - IEEE …, 2021 - ieeexplore.ieee.org
password entry causing to create a gap for information leakage. Moreover, most of the passwords
store passwords… The usability of the password scheme is affected by contextual factors …

Improving Password Generation Algorithm with Parallellism: Comparative Performance Study

S Albarakati, A Almajnoni, D Alqthami… - Computer Science On …, 2024 - Springer
input to produce passwords, while the discriminator, another neural network, distinguishes
between real and generated passwords… , methodologies, and evaluation criteria in the context

Personal PIN leakage from wearable devices

C Wang, X Guo, Y Chen, Y Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
… in the context of divulging secret information (ie, key entries) … deal with non-contextual inputs,
such as passwords and PIN … identify keyboard typing or keyboard passwords by using the …

User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
… They find that although system administrators force the users to create passwordsinputs
on the tablet. A multi-class Support Vector Machine classifier is developed to infer the context of …

An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools

M Jubur, PP Shrestha, N Saxena - ACM Computing Surveys, 2025 - dl.acm.org
… by generating strong, service-specific passwords using … simplify the 2FA process to ideally
just password entry, thereby … , we extend this framework to address these specific contexts. …

A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications

Z Wenhua, MK Hasan, NB Jailani, S Islam… - Computers in Human …, 2024 - Elsevier
… time-based one-time passwords (TOTP) or push notifications … security methods, the author
aims to provide a contextual … the plain text and key as inputs and generates the cipher text …