Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

[PDF][PDF] A survey on the use of graphical passwords in security.

H Gao, W Jia, F Ye, L Ma - J. Softw., 2013 - jsoftware.us
Beginning around 1996, numerous graphical password schemes have been proposed,
motivated by improving password usability and security, two key factors in password scheme …

[PDF][PDF] A systematic literature review of graphical password schemes

TI Shammee, T Akter, M Mou… - Journal of Computing …, 2020 - researchgate.net
Graphical passwords are an alternative to traditional alphanumeric passwords and can
similarly be used to secure online accounts. The widely used alphanumeric passwords have …

TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems

T Kwon, S Na - computers & security, 2014 - Elsevier
A pattern lock system is a widely used graphical password mechanism in today's mobile
computing environment. To unlock a smartphone, a user draws a memorized graphical …

On the security of picture gesture authentication

Z Zhao, GJ Ahn, JJ Seo, H Hu - 22nd USENIX Security Symposium …, 2013 - usenix.org
Computing devices with touch-screens have experienced unprecedented growth in recent
years. Such an evolutionary advance has been facilitated by various applications that are …

A graphical password based system for small mobile devices

WZ Khan, MY Aalsalem, Y Xiang - arXiv preprint arXiv:1110.3844, 2011 - arxiv.org
Passwords provide security mechanism for authentication and protection services against
unwanted access to resources. A graphical based password is one promising alternatives of …

Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation

Z Zhao, GJ Ahn, H Hu - ACM Transactions on Information and System …, 2015 - dl.acm.org
Picture gesture authentication has been recently introduced as an alternative login
experience to text-based password on touch-screen devices. In particular, the newly on …

G-RAT| a novel graphical randomized authentication technique for consumer smart devices

MA Khan, IU Din, SU Jadoon, MK Khan… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
User authentication is the process that is exercised millions of times around the globe by
using different techniques and methods. The most prominent way of authentication is …

[PDF][PDF] Ray's scheme: Graphical password based hybrid authentication system for smart hand held devices

PP Ray - J. Inf. Eng. Appl, 2012 - academia.edu
Passwords provide security mechanism for authentication and protection services against
unwanted access to resources. One promising alternatives of textual passwords is a …