Academic literature on the topic 'Graphical-based password'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Graphical-based password.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Graphical-based password"

1

Nguyen, Thanh An, and Yong Zeng. "A VISION BASED GRAPHICAL PASSWORD." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 14, no. 2 (2010): 43–52. http://dx.doi.org/10.3233/jid-2010-14204.

Full text
Abstract:
Graphical password is an authentication means alternative to textual password and biometric password. Graphical passwords are classified into two groups: picture based password and user-drawn based password. To pass the authentication, in the picture based graphical password, users have to choose right photos whereas in the user-drawn based graphical password, users have to draw correct pictures. In this paper, we propose a new user-drawn based graphical password. The proposed scheme requires users to create their secret by selecting individual points or by connecting points into curves from a
APA, Harvard, Vancouver, ISO, and other styles
2

Sagar, U.P. Prashasthi, U.P. Pravardha Sagar, and Preeti Dubey. "Image-based Object-sequenced Graphical Password Authentication System." International Journal of Microsystems and IoT 2, no. 4 (2024): 730–44. https://doi.org/10.5281/zenodo.11651505.

Full text
Abstract:
Textual passwords (one of the knowledge-based passwords) have been predictable and have long sustained security breaches due to their predictability (password dictionary attacks) and the possibility of shoulder-surfing and other such attacks. Biometric passwords are too rigid and can’t be duplicated but are expensive and cannot be applied to smaller, cost-effective systems. Whereas, Graphical Passwords are reliable, memorable and are known to improve one’s cognition, hence very convenient to the user.  Hybrid Authentication methods are proven to be far more secure than any oth
APA, Harvard, Vancouver, ISO, and other styles
3

Prashasthi, Sagar U. P., Sagar U. P. Pravardha, and P. Dubey. "Image-based Object-sequenced Graphical Password Authentication System." International Journal of Microsystems and IoT 2, no. 7 (2024): 1033–43. https://doi.org/10.5281/zenodo.13331483.

Full text
Abstract:
   Textual passwords (one of the knowledge-based passwords) have been predictable and have long sustained security breaches due to their predictability (password dictionary attacks) and the possibility of shoulder-surfing and other such attacks. Biometric passwords are too rigid and can’t be duplicated but are expensive and cannot be applied to smaller, cost-effective systems. Whereas Graphical Passwords are reliable, memorable and are known to improve one’s cognition, hence very convenient to the user.  Hybrid Authentication methods are proven to be far more secure
APA, Harvard, Vancouver, ISO, and other styles
4

Dias, Norman Ignatius, Mouleeswaran Singanallur Kumaresan, and Reeja Sundaran Rajakumari. "Deep learning based graphical password authentication approach against shoulder-surfing attacks." Multiagent and Grid Systems 19, no. 1 (2023): 99–115. http://dx.doi.org/10.3233/mgs-230024.

Full text
Abstract:
The password used to authenticate users is vulnerable to shoulder-surfing assaults, in which attackers directly observe users and steal their passwords without using any other technical upkeep. The graphical password system is regarded as a likely backup plan to the alphanumeric password system. Additionally, for system privacy and security, a number of programs make considerable use of the graphical password-based authentication method. The user chooses the image for the authentication procedure when using a graphical password. Furthermore, graphical password approaches are more secure than t
APA, Harvard, Vancouver, ISO, and other styles
5

Shaik Mehboob Basha and K.Kumara Swamy. "Web Based Graphical Password Authentication System." international journal of engineering technology and management sciences 9, no. 2 (2025): 779–85. https://doi.org/10.46647/ijetms.2025.v09i02.099.

Full text
Abstract:
Graphical passwords provide a promising alternative to traditional alphanumeric passwords. Theyare attractive since people usually remember pictures better than words. In this extended abstract,we propose a simple graphical password authentication system. We describe its operation withsome examples, and highlight important aspects of the system.
APA, Harvard, Vancouver, ISO, and other styles
6

Jirjees, Seerwan Waleed, Ali Majeed Mahmood, and Ahmed Raoof Nasser. "Passnumbers: An Approach of Graphical Password Authentication Based on Grid Selection." International Journal of Safety and Security Engineering 12, no. 1 (2022): 21–29. http://dx.doi.org/10.18280/ijsse.120103.

Full text
Abstract:
The authentication textual passwords are the most widely used technique. However, this type of legacy authentication is vulnerable to various attacks, such as shoulder-surfing attacks. Hence, graphical password authentication is one of these approaches which has been suggested to overcome the issues related to textual passwords. Nevertheless, the hackers have also developed new techniques that can be finally broken the graphical password, for instance, listening to the transmitted information between the client and the server. In this paper, Passnumbers graphical authentication password is pro
APA, Harvard, Vancouver, ISO, and other styles
7

Khodadadi, Touraj, A. K. M. Muzahidul Islam, Sabariah Baharun, and Shozo Komaki. "Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2939. http://dx.doi.org/10.11591/ijece.v6i6.11227.

Full text
Abstract:
<p>User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as o
APA, Harvard, Vancouver, ISO, and other styles
8

Khodadadi, Touraj, A. K. M. Muzahidul Islam, Sabariah Baharun, and Shozo Komaki. "Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2939. http://dx.doi.org/10.11591/ijece.v6i6.pp2939-2948.

Full text
Abstract:
<p>User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as o
APA, Harvard, Vancouver, ISO, and other styles
9

Prof., Sarita T. Sawale, Kalyani J. Anpat Ms., and Priyanka Savaji Ms. "SURVEY OF GRAPHICAL PASSWORD." International Journal of Advances in Engineering & Scientific Research 2, no. 3 (2015): 01–09. https://doi.org/10.5281/zenodo.10725847.

Full text
Abstract:
<strong><em>Abstract</em><em>: </em></strong> <em>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Over the years security experts in the field of information technology have had a tough time to making passwords secure. Graphical passwords have been designed to try to make passwords more remarkable and more comfortable for people to use and, therefore, more secure. Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alte
APA, Harvard, Vancouver, ISO, and other styles
10

Sekhar Reddy, Y. Chandra, M. Venkateswara Rao, M. Kameswara Rao, C. V. Phaneendra Kumar, and A. Anil Sai. "Graphical Password Using Captcha." International Journal of Advances in Applied Sciences 5, no. 2 (2016): 94. http://dx.doi.org/10.11591/ijaas.v5.i2.pp94-100.

Full text
Abstract:
In this 21st century one of the main issue to tackle was Cyber Security attack. We have numerous authentication processes like two key factor passwords, graphical passwords and many other. Text based passwords are prone to many attacks like dictionary attacks. In this paper, we have implemented a new authentication method namely; a family of graphical passwords built on Captcha technology. As graphical password addresses many security problems like online guessing attacks, relay attacks etc. Captcha is used to distinguish humans and bots. So, we use images with captcha’s as one of the authenti
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Graphical-based password"

1

English, Rosanne. "Modelling the security of recognition-based graphical password schemes." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3797/.

Full text
Abstract:
Recognition-based graphical passwords are a suggested alternative authentication mechanism which have received substantial attention in research literature. The literature often presents new schemes, usability studies or propose countermeasures for specific attacks. Whilst this is beneficial, it does not allow for consistent comparison of the security of recognition-based graphical password schemes. This thesis contributes a proposed solution to this problem. Presented in this thesis are models for estimating the number of attacks required before success for four aspects of the security of a r
APA, Harvard, Vancouver, ISO, and other styles
2

Alesand, Elias, and Hanna Sterneling. "A shoulder-surfing resistant graphical password system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138163.

Full text
Abstract:
The focus of this report is to discuss graphical password systems and how they can contribute to handle security problems that threaten authentication processes. One such threat is shoulder-surfing attacks, which are also reviewed in this report. Three already existing systems that are claimed to be shoulder-surfing resilient are described and a new proposed system is presented and evaluated through a user study. Moreover, the system is compared to the mentioned existing systems to further evaluate the usability, memorability and the time it takes to authenticate. The user study shows that tes
APA, Harvard, Vancouver, ISO, and other styles
3

Saevarsson, Freyr. "Combinatorics in Pattern-Based Graphical Passwords." Thesis, KTH, Matematik (Inst.), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102004.

Full text
Abstract:
Because of increased computing power it is necessary for modern passwords to be very long and complex, this makes them hard to remember. Research show that it might be easier for people to remember visual passwords instead of textual ones. The goal of this project was to find a safe graphical password scheme which does not require any modification on the server side. A proposed solution is called the Abagram which is a system that transforms patterns on a grid into textual passwords. The main idea behind the scheme is to assign each cell in the grid a letter or a symbol. The users select some
APA, Harvard, Vancouver, ISO, and other styles
4

Sparks, Jonathan William. "The Impact of Image Synonyms in Graphical-Based Authentication Systems." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/33.

Full text
Abstract:
Traditional text-based passwords used for authentication in information systems have several known issues in the areas of usability and security. Research has shown that when users generate passwords for systems, they tend to create passwords that are subject to compromise more so than those created randomly by the computer. Research has also shown that users have difficulty remembering highly secure, randomly created, text-based passwords. Graphical-based passwords have been shown to be highly memorable for users when applied to system authentication. However, graphical-based authentication s
APA, Harvard, Vancouver, ISO, and other styles
5

Aljahdali, Hani Moaiteq. "Using cultural familiarity for usable and secure recognition-based graphical passwords." Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6288/.

Full text
Abstract:
Recognition-based graphical passwords (RBGPs) are a promising alternative to alphanumeric passwords for user authentication. The literature presented several schemes in order to find the best types of pictures in terms of usability and security. This thesis contributes the positive use of cultural familiarity with pictures for usable and secure recognition-based graphical passwords in two different countries: Scotland and Saudi Arabia. This thesis presents an evaluation of a culturally-familiar graphical password scheme (CFGPS). This scheme is based on pictures that represent the daily life in
APA, Harvard, Vancouver, ISO, and other styles
6

Jebriel, Salem Meftah. "Empirical approach towards investigating usability, guessability and social factors affecting graphical based passwords security." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5399/.

Full text
Abstract:
This thesis investigates the usability and security of recognition-based graphical authentication schemes in which users provide simple images. These images can either be drawn on paper and scanned into the computer, or alternatively, they can be created with a computer paint program. In our first study, looked at how culture and gender might affect the types of images drawn. A large number of simple drawings were provided by Libyan, Scottish and Nigerian participants and then divided into categories. Our research found that many doodles (perhaps as many as 20%) contained clues about the parti
APA, Harvard, Vancouver, ISO, and other styles
7

Chowdhury, Soumyadeb. "Exploring the memorability of multiple recognition-based graphical passwords and their resistance to guessability attacks." Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6210/.

Full text
Abstract:
Most users find it difficult to remember traditional text-based passwords. In order to cope with multiple passwords, users tend to adopt unsafe mechanisms like writing down the passwords or sharing them with others. Recognition-based graphical authentication systems (RBGSs) have been proposed as one potential solution to minimize the above problems. But, most prior works in the field of RBGSs make the unrealistic assumption of studying a single password. It is also an untested assumption that RBGS passwords are resistant to being written down or verbally communicated. The main aim of the resea
APA, Harvard, Vancouver, ISO, and other styles
8

Gyorffy, John. "Token-based Graphical Password Authentication." Master's thesis, 2009. http://hdl.handle.net/10048/411.

Full text
Abstract:
Given that phishing is an ever increasing problem, a better authentication system than the current alphanumeric system is needed. Because of the large number of current authentication systems that use alphanumeric passwords, a new solution should be compatible with these systems. We propose a system that uses a graphical password deployed from a Trojan and virus resistant embedded device as a possible solution. The graphical password would require the user to choose a family photo sized to 441x331 pixels. Using this image, a novel, image hash provides an input into a cryptosystem on the embedd
APA, Harvard, Vancouver, ISO, and other styles
9

Ji, Shuo-Heng, and 紀碩恆. "User Authentication based on Graphical Password." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/74376935584765869568.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>資訊工程系碩士班<br>102<br>Traditional text-based password authentication scheme has the drawbacks of being easily cracked for weak passwords, and being hard to remember for strong ones. In recent years, graphical password has been proposed as an alternative solution for the authentication problem. This paper proposes a graphical password authentication scheme which uses the EMD (exploiting modification direction method) technique to hide a one-time password into an image. In order to obtain the one-time password from the image, user must pick the positions of the image as the same a
APA, Harvard, Vancouver, ISO, and other styles
10

Fang, Chiung-Cheng, and 方炯程. "A Map Based Graphical-Password Authentication System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73702059966334727495.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>99<br>認證系統使用文字密碼已經有段相當長的時間。文字密碼本質上是安 全的,然而,卻也有些非常嚴重的缺點,記憶性與安全性問題。根據 先前一些研究指出,人類對於記憶圖形的能力是比記憶文字要高出許 多的。因此,便有許多研究提出圖形密碼的概念來解決文字密碼的缺 點。Wiedenbeck 等人於2005 提出PassPoints,在此系統中使用者密 碼為一張圖片上有順序的五個點。為讓使用者記憶較少的點,卻擁有 更高的安全強度。基於使用極大尺寸圖片作為密碼空間的概念,我們 提出了以地圖為基礎的圖形密碼認證系統PassMap,其密碼為世界地 圖上有順序的兩個點。根據實驗結果,PassMap 不僅減少使用者記憶 上的負擔,在實際操作上也便於使用。而在安全考量上,PassMap 除 了提供更高的Entropy,也大幅增加了攻擊的成本。
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Graphical-based password"

1

Patil, Nikhil, Ganesh Bhutkar, Priyanshi Patil, Parth Pishte, and Apoorva Popalghat. "Graphical-Based Password Authentication." In ICT Analysis and Applications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-6568-7_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Khan, Wazir Zada, Yang Xiang, Mohammed Y. Aalsalem, and Quratulain Arshad. "A Hybrid Graphical Password Based System." In Algorithms and Architectures for Parallel Processing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24669-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yadav, Bipin, Kaptan Singh, and Amit Saxena. "Video Based Graphical Password Authentication System." In Proceedings of International Conference on Network Security and Blockchain Technology. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3182-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tiwari, Abhishek, and Rajarshi Pal. "Gaze-Based Graphical Password Using Webcam." In Information Systems Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lapin, Kristina, and Manfredas Šiurkus. "Balancing Usability and Security of Graphical Passwords." In Digital Interaction and Machine Intelligence. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11432-8_15.

Full text
Abstract:
AbstractAlthough most widely used authentication involves characters as passwords, but secure text-based passwords are complex and difficult to remember. Users want to have easy to remember passwords, but these are vulnerable to various kinds of attacks and are predictable. To address these problems, graphical passwords that involve selection of images and drawing lines have been proposed. The encoded images support creation of secure passwords and facilitate their memorability. Thus, they are considered as an alternative to strengthen password security while preserving usability because secur
APA, Harvard, Vancouver, ISO, and other styles
6

Islam, Amanul, Lip Yee Por, Fazidah Othman, and Chin Soon Ku. "A Review on Recognition-Based Graphical Password Techniques." In Lecture Notes in Electrical Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2622-6_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Poonkuzhali, S., A. Abuthahir, S. P. Dinesh, and D. Daadreyaa. "Enhanced Graphical Password Authentication System Based on Puzzles." In Disruptive Technologies for Sustainable Development. CRC Press, 2024. http://dx.doi.org/10.1201/9781003428473-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ku, Yunlim, Okkyung Choi, Kangseok Kim, et al. "Extended OTP Mechanism Based on Graphical Password Method." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-4516-2_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kawagoe, Kyoji, Shinichi Sakaguchi, Yuki Sakon, and Hung-Hsuan Huang. "Tag Association Based Graphical Password Using Image Feature Matching." In Database Systems for Advanced Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29035-0_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Qin, Xinyuan, and Wenjuan Li. "A Graphical Password Scheme Based on Rounded Image Selection." In Science of Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45933-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Graphical-based password"

1

F.Abbas, Safa, and Lahieb M.Jawad. "Hybrid Graphical Password Authentication Technique Based On GLCM And Canny Edge Detection." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sarkhoshi, Mozhdeh, and Qianmu Li. "Cognitive Graphical Password based on Recognition with Improved User Functionality." In 12th International Conference on Computer Science and Information Technology (CCSIT 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121302.

Full text
Abstract:
The fact that photos and graphics are more easily recalled by humans than text led to the proposal that visual passwords may be a viable alternative to text passwords in certain situations. User-friendliness characteristics of existing models are based on graphical password recognition, and the introduction of a new model that is related to the specifications and features of ISO standard usability and to the specifications and features of general usability specifications and features is being considered. Once these criteria and characteristics and subcomponents of usability had been compared,
APA, Harvard, Vancouver, ISO, and other styles
3

Chiasson, Sonia, Alain Forget, Elizabeth Stobert, P. C. van Oorschot, and Robert Biddle. "Multiple password interference in text passwords and click-based graphical passwords." In the 16th ACM conference. ACM Press, 2009. http://dx.doi.org/10.1145/1653662.1653722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Bin B., Dongchen Wei, Maowei Yang, and Jeff Yan. "Security implications of password discretization for click-based graphical passwords." In the 22nd international conference. ACM Press, 2013. http://dx.doi.org/10.1145/2488388.2488526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kayode Alese, Boniface, Adewumi Adewale Omojowo, Tosin Akinwale Adesuyi, Aderonke Favour-Bethy Thompson, Sunday Olumide Adewale, and Festus A. Osuolale. "An Enhanced Graphical Password Technique Using Fake Pointers." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2221.

Full text
Abstract:
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited. Graphical password is a possible alternative. Consequently, this paper designs a new graphical password technique based on images, rather than alphanumeric strings. Although, graphical password technique is more secure than textual password. It is al
APA, Harvard, Vancouver, ISO, and other styles
6

M., Senbagavalli, Saswati Debnath, and Ramalakshmi K. "SECRET KEY VERIFICATION TECHNIQUES FOR GRAPHICAL PASSWORD AUTHENTICATION SYSTEM TO AVOID SHOULDER SURFING." In TOPICS IN INTELLIGENT COMPUTING AND INDUSTRY DESIGN (ICID). Volkson Press, 2022. http://dx.doi.org/10.26480/icpesd.03.2022.172.177.

Full text
Abstract:
The main objective of this proposed system is used to reduce the human effort and time to complete any online process in successful and secure way. Because Nowadays, Most of the Work is done online. Internet has reduced a lot of human efforts. These difficult and time-consuming tasks have been eased through the Internet. Everyone goes to their own portals/sites or uses app to complete these duties. The current confirmation frameworks need safer and dependable strategies. Thus, an upgraded rendition of Graphical secret key verification framework is required, one that can find harmony between se
APA, Harvard, Vancouver, ISO, and other styles
7

Kaka, Jiya Gloria, Oyefolahan O. Ishaq, and Joseph O. Ojeniyi. "Recognition-Based Graphical Password Algorithms: A Survey." In 2020 IEEE 2nd International Conference on Cyberspace (CYBER NIGERIA). IEEE, 2021. http://dx.doi.org/10.1109/cybernigeria51635.2021.9428801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Agarwal, Gaurav, Saurabh Singh, and Ajay Indian. "Analysis of knowledge based graphical password authentication." In Education (ICCSE 2011). IEEE, 2011. http://dx.doi.org/10.1109/iccse.2011.6028707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chimakurthi, B. N. V. Vishnu Priya, and KOLLA BHANU PRAKASH. "Image and Video-based Graphical Password Authentication." In 2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT). IEEE, 2022. http://dx.doi.org/10.1109/iceeict53079.2022.9768604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khan, Altaf, and Alexander G. Chefranov. "A Captcha-Based Graphical Password With Strong Password Space and Usability Study." In 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE). IEEE, 2020. http://dx.doi.org/10.1109/icecce49384.2020.9179265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!