P Ray, D Giri, W Meng, S Hore - Multimedia Tools and Applications, 2024 - Springer
Nowadays, the graphical password has gained significant recognition and has become a subject of extensive investigation within the research community. The proliferation of Internet …
H Alhakami - International Journal of Advanced …, 2020 - pdfs.semanticscholar.org
Knowledge-based Authentication (KBA) is an authentication approach, which verifying the user identity when accessing services such as finical websites. KBA requests specific …
User authentication is an essential component in nearly all electronic payment systems. Authentication provides the foundation for a user, legal access control, and user …
NSK Bashah, MAAK Niza… - 2023 IEEE 8th International …, 2023 - ieeexplore.ieee.org
Mobile devices are very important in our daily life nowadays. However, it has security drawbacks particularly in device authentication. Conventional text-based passwords are …
P Sharma, R Bedi, V Dhiman - International Conference on Computational …, 2022 - Springer
Early diagnosis and accurate identification of acute diseases such as heart attacks are crucial for effective control and management. Automated techniques utilizing machine …
S Verma, M Singh, K Chaturvedi… - … Intelligence in Pattern …, 2022 - Springer
Most typical authentication mechanisms in this digitized world use a username and password to protect information. Two-factor authentication (2FA) mechanisms were …