Prevention of shoulder-surfing attacks using shifting condition using digraph substitution rules

A Islam, F Othman, N Sakib, HMH Babu - arXiv preprint arXiv:2305.06549, 2023 - arxiv.org
Graphical passwords are implemented as an alternative scheme to replace alphanumeric
passwords to help users to memorize their password. However, most of the graphical …

A systematic review of graphical password methods resistant to shoulder-surfing attacks

F Binbeshr, KC Siong, L Yee, M Imam… - International Journal of …, 2025 - Springer
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …

GPOD: an efficient and secure graphical password authentication system by fast object detection

P Ray, D Giri, W Meng, S Hore - Multimedia Tools and Applications, 2024 - Springer
Nowadays, the graphical password has gained significant recognition and has become a
subject of extensive investigation within the research community. The proliferation of Internet …

Deep learning based graphical password authentication approach against shoulder-surfing attacks

NI Dias, MS Kumaresan… - Multiagent and Grid …, 2023 - content.iospress.com
The password used to authenticate users is vulnerable to shoulder-surfing assaults, in which
attackers directly observe users and steal their passwords without using any other technical …

Smartgp: A framework for a two-factor graphical password authentication using smart devices

P Ray, R Mukherjee, D Giri, M Sasmal - International Conference on …, 2022 - Springer
Authentication procedures are employed to verify and validate user's identification on
various smart devices and a variety of digital apps. Alphanumeric and Personal Identification …

An Efficient Login Authentication System against Multiple Attacks in Mobile Devices

Y Li, X Yun, L Fang, C Ge - Symmetry, 2021 - mdpi.com
Access management of IoT devices is extremely important, and a secure login
authentication scheme can effectively protect users' privacy. However, traditional …

[PDF][PDF] RoundPIN: Shoulder Surfing Resistance for PIN Entry with Randomize Keypad

SW Jirjees, AR Nasser… - Journal homepage: http …, 2021 - researchgate.net
Accepted: 12 December 2021 The security of a PIN is largely supported by the
authentication process in ATM. Most authentication methods like traditional are based on …

An efficient and untraceable authentication protocol for cloud-based healthcare system

S Panda, S Mondal - Machine Learning for Biometrics, 2022 - Elsevier
Telecare medical information system (TMIS) extends the healthcare services to remote
locations where a patient can consult with a doctor without visiting the hospital in person …

Webbläsares inbyggda lösenordshanterare: Faktorer som påverkar privatpersoners användning/ickeanvändning av webbläsares inbyggda lösenordshanterare

J Klaar, A Masak - 2021 - diva-portal.org
Kunskap om lösenord och deras säkerhet är idag något som förbises av den gemene
datoranvändaren. Lösenordshanterare kan både hjälpa och skydda vid hanteringen av …

An Efficient Login Authentication System against Multiple Attacks in Mobile Devices. Symmetry 2021, 13, 125

Y Li, X Yun, L Fang, C Ge - 2021 - search.proquest.com
Access management of IoT devices is extremely important, and a secure login
authentication scheme can effectively protect users' privacy. However, traditional …