2020
DOI: 10.1002/spy2.125
|View full text |Cite
|
Sign up to set email alerts
|

Graphical passwords: Behind the attainment of goals

Abstract: Graphical authentication methods have emerged as an alternative to the conventional authentication methods over the past couple of decades. One of the most popular among types of graphical authentication methods is recognition-based authentication, where the user taps on pass images from one or more challenge sets of images in order to authenticate. The study of existing graphical authentication systems shows that several of them compromise their security while making the method simpler, which could lead to pe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 22 publications
(44 reference statements)
0
0
0
Order By: Relevance
“…To date, the GP is not widely used in the real world; only the pass-face technique is used in many systems. so, research is still being done on it to make it reliable and give confidence to the user to select the GP [17].…”
Section: Results and Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…To date, the GP is not widely used in the real world; only the pass-face technique is used in many systems. so, research is still being done on it to make it reliable and give confidence to the user to select the GP [17].…”
Section: Results and Analysismentioning
confidence: 99%
“…The success rate of any GP system depends on its security, reliability, memorability, usability, speed, time, and password entropy [17,18]. The three main factors of GP are Security, usability or memorability, and time.…”
Section: Results and Analysismentioning
confidence: 99%
See 3 more Smart Citations