2019
DOI: 10.14569/ijacsa.2019.0100957
|View full text |Cite
|
Sign up to set email alerts
|

A New Shoulder Surfing and Mobile Key-Logging Resistant Graphical Password Scheme for Smart-Held Devices

Abstract: In globalization of information, internet has played a vital role by providing an easy and fast access of information and systems to remote users. However, with ease for authentic users, it has made information resources accessible to unauthorized users too. To authorize legitimate user for the access of information and systems, authentication mechanisms are applied. Many users use their credentials or private information at public places to access their accounts that are protected by passwords. These password… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…The wide range of evaluation methods and metrics used in graphical password studies makes it challenging to compare and synthesize findings across the field. For usability evaluations, studies employ various methods such as user experiments, surveys, and theoretical analysis, with metrics spanning success rate, login time, error rate, SUS score, and qualitative feedback (Meng and Liu, 2018;Mackie and Yıldırım, 2018;Hanif et al, 2019). Similarly, security evaluations use different approaches like theoretical analysis, attack simulations, and user studies, considering various attack models (Wang et al, 2022;Yu et al, 2017;Ratchasan and Wiangsripanawan, 2019).…”
Section: Fig 7 Sunburst Diagram Of Graphical Password Methodsmentioning
confidence: 99%
“…The wide range of evaluation methods and metrics used in graphical password studies makes it challenging to compare and synthesize findings across the field. For usability evaluations, studies employ various methods such as user experiments, surveys, and theoretical analysis, with metrics spanning success rate, login time, error rate, SUS score, and qualitative feedback (Meng and Liu, 2018;Mackie and Yıldırım, 2018;Hanif et al, 2019). Similarly, security evaluations use different approaches like theoretical analysis, attack simulations, and user studies, considering various attack models (Wang et al, 2022;Yu et al, 2017;Ratchasan and Wiangsripanawan, 2019).…”
Section: Fig 7 Sunburst Diagram Of Graphical Password Methodsmentioning
confidence: 99%