Exploring the meaning of usable security–a literature review

M Lennartsson, J Kävrestad… - Information & Computer …, 2021 - emerald.com
Purpose For decades, literature has reported on the perceived conflict between usability and
security. This mutual trade-off needs to be considered and addressed whenever security …

A novel graphical password authentication scheme with improved usability

T Khodadadi, Y Javadianasl, F Rabiei… - 2021 4th …, 2021 - ieeexplore.ieee.org
Pictures are remembered better than text by humans, motivated by the proposition that
graphical authentication passwords are the possible alternatives for text-based passwords …

A taxonomy of multimedia-based graphical user authentication for green Internet of Things

KA Awan, I Ud Din, A Almogren, N Kumar… - ACM Transactions on …, 2021 - dl.acm.org
Authentication receives enormous consideration from the research community and is proven
to be an interesting field in today's era. User authentication is the major concern because …

GPOD: an efficient and secure graphical password authentication system by fast object detection

P Ray, D Giri, W Meng, S Hore - Multimedia Tools and Applications, 2023 - Springer
Nowadays, the graphical password has gained significant recognition and has become a
subject of extensive investigation within the research community. The proliferation of Internet …

Continuous m-Health data authentication using wavelet decomposition for feature extraction

T Enamamu, A Otebolaku, J Marchang, J Dany - Sensors, 2020 - mdpi.com
The World Health Organization (WHO) in 2016 considered m-health as:“the use of mobile
wireless technologies including smart devices such as smartphones and smartwatches for …

A systematic literature review on security indicators for open-source Enterprise resource planning software

JW Njuki, GM Muketha, JG Ndia - 2022 - repository.mut.ac.ke
Open-source enterprise resource planning (ERP) software has become a preferred
alternative for modern organizations due to its affordable cost, availability and ease of …

[PDF][PDF] Enhanced model for ergonomic evaluation of information systems: application to scientific research information system

K Benmoussa, M Laaziri, S Khoulji… - International Journal of …, 2019 - academia.edu
Considering the importance of the ergonomic aspect for information systems in providing an
easy use of the computing systems, this paper focuses on the elaboration of a hybrid model …

Exploring the meaning of “usable security”

M Lennartsson, J Kävrestad, M Nohlberg - Human Aspects of Information …, 2020 - Springer
While there are many examples of incidents that make the need for more work around the
human aspects of security apparent, the literature makes it obvious that usable security can …

[PDF][PDF] A novel automatic voice recognition system based on text-independent in a noisy environment

M Hamza, T Khodadadi… - International Journal of …, 2020 - academia.edu
Automatic voice recognition system aims to limit fraudulent access to sensitive areas as labs.
Our primary objective of this paper is to increase the accuracy of the voice recognition in …

IoTGazePass: A new password scheme for IoT applications

FM Alfard, AA Keshlaf… - 2021 IEEE 1st International …, 2021 - ieeexplore.ieee.org
Authentication is one of the most important security aspects to protect user privacy in
computers, internet environments and IoT applications. In this regard, the traditional textual …