2013
DOI: 10.1007/s10207-013-0216-7
|View full text |Cite
|
Sign up to set email alerts
|

Shoulder-surfing-proof graphical password authentication scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(28 citation statements)
references
References 23 publications
0
28
0
Order By: Relevance
“…This makes it difficult for a peeper to identify the user's password. Later Wu et al [72] designed a method that combines the Convex Hull click method [67], [68] with the eye-tracker input method [71] in order to provide better security as compared to the individual techniques.…”
Section: A Existing Authentication Systemsmentioning
confidence: 99%
“…This makes it difficult for a peeper to identify the user's password. Later Wu et al [72] designed a method that combines the Convex Hull click method [67], [68] with the eye-tracker input method [71] in order to provide better security as compared to the individual techniques.…”
Section: A Existing Authentication Systemsmentioning
confidence: 99%
“…For example, if there is someone stands beside the user during their login process. Therefore, in order to cope with shoulder surfing problem, the blurring methods is included in the system to prevent any attempt to steal password through shoulder surfing [5,14]. Once the images loaded into the system, it will immediately become blurred this can prevent the particular images seen by others.…”
Section: Proposed Login Flow Chartmentioning
confidence: 99%
“…In addition to this, scholars showed that legitimate users always tend to choose an easy password [2,14,15] On the other hand, to avoid some of the above issues, researchers proposed to apply a policy when a legitimate user creates his/her password; as an example asking a user to choose a password which consists of a combination of numbers and alphanumerical and then provides information about how strength and secure the chosen password. Despite these policies, users often tend to choose an easy password.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Unauthorized access to such devices could put huge amounts of sensitive information at the risks of misuse. Traditional user verification solutions mainly rely on passwords or graphical patterns [29,52], which suffer from various attacks including password theft, shoulder surfing [53] and smudge attacks [9]. Biometric-based user verification opens up a new pathway to secure mobile devices, especially fingerprint-based solutions [7,31], which are widely deployed in many premium smartphones (e.g., iPhones and Samsung phones) and offer a more secured way to access mobile and smart devices.…”
Section: Introductionmentioning
confidence: 99%