A systematic review of graphical password methods resistant to shoulder-surfing attacks

F Binbeshr, KC Siong, L Yee, M Imam… - International Journal of …, 2025 - Springer
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …

GPOD: an efficient and secure graphical password authentication system by fast object detection

P Ray, D Giri, W Meng, S Hore - Multimedia Tools and Applications, 2024 - Springer
Nowadays, the graphical password has gained significant recognition and has become a
subject of extensive investigation within the research community. The proliferation of Internet …

[PDF][PDF] Knowledge based authentication techniques and challenges

H Alhakami - International Journal of Advanced …, 2020 - pdfs.semanticscholar.org
Knowledge-based Authentication (KBA) is an authentication approach, which verifying the
user identity when accessing services such as finical websites. KBA requests specific …

Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System

SIA Sani, JK Alhassan, AS Mohammed - Illumination of Artificial …, 2022 - Springer
User authentication is an essential component in nearly all electronic payment systems.
Authentication provides the foundation for a user, legal access control, and user …

Secure Mobile Login using Three-Layer Graphical User Interface (GUI) Authentication

NSK Bashah, MAAK Niza… - 2023 IEEE 8th International …, 2023 - ieeexplore.ieee.org
Mobile devices are very important in our daily life nowadays. However, it has security
drawbacks particularly in device authentication. Conventional text-based passwords are …

Performance Investigation of SVM and Modified SVM Algorithms for Acute Health Diagnosis

P Sharma, R Bedi, V Dhiman - International Conference on Computational …, 2022 - Springer
Early diagnosis and accurate identification of acute diseases such as heart attacks are
crucial for effective control and management. Automated techniques utilizing machine …

An Efficient Multifactor Authentication System

S Verma, M Singh, K Chaturvedi… - … Intelligence in Pattern …, 2022 - Springer
Most typical authentication mechanisms in this digitized world use a username and
password to protect information. Two-factor authentication (2FA) mechanisms were …