Journal articles on the topic 'Graphical-based password'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Graphical-based password.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nguyen, Thanh An, and Yong Zeng. "A VISION BASED GRAPHICAL PASSWORD." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 14, no. 2 (2010): 43–52. http://dx.doi.org/10.3233/jid-2010-14204.
Full textSagar, U.P. Prashasthi, U.P. Pravardha Sagar, and Preeti Dubey. "Image-based Object-sequenced Graphical Password Authentication System." International Journal of Microsystems and IoT 2, no. 4 (2024): 730–44. https://doi.org/10.5281/zenodo.11651505.
Full textPrashasthi, Sagar U. P., Sagar U. P. Pravardha, and P. Dubey. "Image-based Object-sequenced Graphical Password Authentication System." International Journal of Microsystems and IoT 2, no. 7 (2024): 1033–43. https://doi.org/10.5281/zenodo.13331483.
Full textDias, Norman Ignatius, Mouleeswaran Singanallur Kumaresan, and Reeja Sundaran Rajakumari. "Deep learning based graphical password authentication approach against shoulder-surfing attacks." Multiagent and Grid Systems 19, no. 1 (2023): 99–115. http://dx.doi.org/10.3233/mgs-230024.
Full textShaik Mehboob Basha and K.Kumara Swamy. "Web Based Graphical Password Authentication System." international journal of engineering technology and management sciences 9, no. 2 (2025): 779–85. https://doi.org/10.46647/ijetms.2025.v09i02.099.
Full textJirjees, Seerwan Waleed, Ali Majeed Mahmood, and Ahmed Raoof Nasser. "Passnumbers: An Approach of Graphical Password Authentication Based on Grid Selection." International Journal of Safety and Security Engineering 12, no. 1 (2022): 21–29. http://dx.doi.org/10.18280/ijsse.120103.
Full textKhodadadi, Touraj, A. K. M. Muzahidul Islam, Sabariah Baharun, and Shozo Komaki. "Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2939. http://dx.doi.org/10.11591/ijece.v6i6.11227.
Full textKhodadadi, Touraj, A. K. M. Muzahidul Islam, Sabariah Baharun, and Shozo Komaki. "Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2939. http://dx.doi.org/10.11591/ijece.v6i6.pp2939-2948.
Full textProf., Sarita T. Sawale, Kalyani J. Anpat Ms., and Priyanka Savaji Ms. "SURVEY OF GRAPHICAL PASSWORD." International Journal of Advances in Engineering & Scientific Research 2, no. 3 (2015): 01–09. https://doi.org/10.5281/zenodo.10725847.
Full textSekhar Reddy, Y. Chandra, M. Venkateswara Rao, M. Kameswara Rao, C. V. Phaneendra Kumar, and A. Anil Sai. "Graphical Password Using Captcha." International Journal of Advances in Applied Sciences 5, no. 2 (2016): 94. http://dx.doi.org/10.11591/ijaas.v5.i2.pp94-100.
Full textZhou, Zhili, Ching-Nung Yang, Yimin Yang, and Xingming Sun. "Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment." Complexity 2019 (November 16, 2019): 1–8. http://dx.doi.org/10.1155/2019/2875676.
Full textHamid, Soomaiya, Narmeen Zakaria Bawany, and Shahzeb Khan. "AcSIS: Authentication System Based on Image Splicing." Engineering, Technology & Applied Science Research 9, no. 5 (2019): 4808–12. https://doi.org/10.5281/zenodo.3510300.
Full textAnitha, M., and G. Saranya. "User Privileged CAPTCHA as Graphical Password for Multistage Authentication." International Journal of Advance Research and Innovation 3, no. 1 (2015): 28–33. http://dx.doi.org/10.51976/ijari.311505.
Full textGopalakrishnan, Adithya, Anugraha K Anil, Anu Thomas, Devika Vijayan ,, and Mafnitha K K. "Graphical Password Authentication: Strengthening Security in the Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43155.
Full textGolar, Priti C., and Rika Sharma. "An Advanced Knowledge Based Graphical Authentication Framework with Guaranteed Confidentiality and Integrity." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 720–30. http://dx.doi.org/10.17762/ijritcc.v11i8s.7676.
Full textRoy, Indrani, Ajmerry Hossain, and SARKER TANVEER AHMED RUMEE. "Attacks on Graphical Password: A Study on Defense Mechanisms and Limitations." International Journal of Information Technology and Applied Sciences (IJITAS) 3, no. 4 (2021): 180–83. http://dx.doi.org/10.52502/ijitas.v3i4.201.
Full textF. Abbas, Safa, and Lahieb M. Jawad. "PASS POINT SELECTION OF AUTOMATIC GRAPHICAL PASSWORD AUTHENTICATION TECHNIQUE BASED ON HISTOGRAM METHOD." Iraqi Journal of Information and Communication Technology 6, no. 1 (2023): 28–39. http://dx.doi.org/10.31987/ijict.6.1.212.
Full textWerner, Steffen, Christopher Hauck, and Marshall Masingale. "Password Entry Times for Recognition-based Graphical Passwords." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 755–59. http://dx.doi.org/10.1177/1541931213601173.
Full textYang, Gi-Chul, and . "A New Graphical Password System Using Intersecting Points in a Signature." International Journal of Engineering & Technology 7, no. 4.39 (2018): 61–64. http://dx.doi.org/10.14419/ijet.v7i4.39.23707.
Full textAbhishek, Narayan Shah, Anand Dipti, Samanta Sabyasachi, and Dey Dipankar. "Graphical Password Authentication System Using Modified Intuitive Approach." International Journal of HIT Transaction on ECCN Vol. 7, no. 2A (2021) (2021): 64–71. https://doi.org/10.5281/zenodo.5893206.
Full textSaha, Hasi, Ganesh Chandra Saha, Roshidul H, and Zakirul Islsam. "USER AUTHENTICATION THROUGH CUED CLICK POINTS BASED GRAPHICAL PASSWORD." American Journal of Agricultural Science, Engineering, and Technology 3, no. 1 (2017): 1–12. http://dx.doi.org/10.54536/ajaset.v3i1.38.
Full textMaw, Maw Naing, and Win Ohnmar. "Graphical Password Authentication using image Segmentation for Web Based Applications." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1461–64. https://doi.org/10.5281/zenodo.3591236.
Full textLin, Tsung-Hung, Cheng-Chi Lee, Chwei-Shyong Tsai, and Shin-Dong Guo. "A tabular steganography scheme for graphical password authentication." Computer Science and Information Systems 7, no. 4 (2010): 823–41. http://dx.doi.org/10.2298/csis081223028l.
Full textHerrera-Macías, Joaquín Alberto, Carlos Miguel Legón-Pérez, Lisset Suárez-Plasencia, Luis Ramiro Piñeiro-Díaz, Omar Rojas, and Guillermo Sosa-Gómez. "Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points." Symmetry 13, no. 5 (2021): 777. http://dx.doi.org/10.3390/sym13050777.
Full textNandi, Pathik, and Dr Preeti Savant. "Graphical Password Authentication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1759–65. http://dx.doi.org/10.22214/ijraset.2022.41621.
Full textL.P.Ramyasri, P., D. Malathi, J. D. Dorathi Jayaseeli, and K. Senthilkumar. "Study and Development of Graphical Authentication System for Secure File Transmission." International Journal of Engineering & Technology 7, no. 4.10 (2018): 470. http://dx.doi.org/10.14419/ijet.v7i4.10.21042.
Full textHamid, S., N. Z. Bawany, and S. Khan. "AcSIS: Authentication System Based on Image Splicing." Engineering, Technology & Applied Science Research 9, no. 5 (2019): 4808–12. http://dx.doi.org/10.48084/etasr.3060.
Full textLoganathan, D. "Graphical Password Authentication: Image Grid Based Digital Lock for Mobile Apps." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 4735–47. http://dx.doi.org/10.22214/ijraset.2023.52681.
Full textAwan, Kamran Ahmad, Ikram Ud Din, Abeer Almogren, Neeraj Kumar, and Ahmad Almogren. "A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things." ACM Transactions on Internet Technology 22, no. 2 (2022): 1–28. http://dx.doi.org/10.1145/3433544.
Full textRangari, Mr Shantanu, and Prof K. R. Ingole. "Review Paper Graphical Password Authentication Technique for Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1980–82. http://dx.doi.org/10.22214/ijraset.2022.40969.
Full textEdward, Audu Lovingkindness, Hassan Suru, and Mustapha Abubakar Giro. "A Comparison Between Position-Based and Image-Based Multi-Layer Graphical user Authentication System." Oriental journal of computer science and technology 16, no. 01 (2023): 46–60. http://dx.doi.org/10.13005/ojcst16.01.03.
Full textSantoso, Joseph Teguh, Budi Raharjo, and Agus Wibowo. "Combination of Alphanumeric Password and Graphic Authentication for Cyber Security." Journal of Internet Services and Information Security 14, no. 1 (2023): 16–36. http://dx.doi.org/10.58346/jisis.2024.i1.002.
Full textSaadi, Zena Mohammad, Ahmed T. Sadiq, Omar Z. Akif, and Alaa K. Farhan. "A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords." Electronics 13, no. 15 (2024): 3042. http://dx.doi.org/10.3390/electronics13153042.
Full textGyorffy, John Charles, Andrew F. Tappenden, and James Miller. "Token-based graphical password authentication." International Journal of Information Security 10, no. 6 (2011): 321–36. http://dx.doi.org/10.1007/s10207-011-0147-0.
Full textGeetha, Mrs Ch Naga Lakshmi, A. Sowmya Sri Satya Devi, J. Harshita Maha Lakshmi, Suvvari Aravind, and A. Sri Ramanna Dora. "A Recognition-Based Graphical Password System for Enhanced User Authentication." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5357–61. http://dx.doi.org/10.22214/ijraset.2024.61183.
Full textKatsini, Christina, Nikolaos Avouris, and Christos Fidas. "CogniPGA: Longitudinal Evaluation of Picture Gesture Authentication with Cognition-Based Intervention." i-com 18, no. 3 (2019): 237–57. http://dx.doi.org/10.1515/icom-2019-0011.
Full textGangadhara Rao, K., Vijayakumari Rodda, and B. Basaveswara Rao. "Qualitative Analysis of Recognition-based Graphical Password Authentication Schemes for Accessing the Cloud." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 2 (2017): 507. http://dx.doi.org/10.11591/ijeecs.v7.i2.pp507-513.
Full textKumar, Aayush, Keshav Kumar, Siddharth Shekhar Singh, and M. Vaneeta. "An Efficient Graphical Authentication System." Asian Journal of Science and Applied Technology 6, no. 1 (2017): 42–45. http://dx.doi.org/10.51983/ajsat-2017.6.1.937.
Full textRangari, Mr Shantanu, and Prof K. R. Ingole. "Implementation of Graphical Password Authentication Technique for Security Using Cued Click Points Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1476–79. http://dx.doi.org/10.22214/ijraset.2022.41416.
Full textKumar, Esha. "Securing Graphical Password Techniques from Shoulder Surfing and Camera Based Attacks." International Journal of Recent Technology and Engineering (IJRTE) 11, no. 3 (2022): 1–5. http://dx.doi.org/10.35940/ijrte.b7164.0911322.
Full textR, Poonkodi, Jawahar Sriraam S R, Deepakvel M, Gokulnath J, and Jagathishprabu S. "An Enhanced Security Model for Simple Reformation-Based Password Scheme using PHP." International Journal of Computer Science and Mobile Computing 11, no. 5 (2022): 40–50. http://dx.doi.org/10.47760/ijcsmc.2022.v11i05.004.
Full textSuárez-Plasencia, Lisset, Joaquín Alberto Herrera-Macías, Carlos Miguel Legón-Pérez, Guillermo Sosa-Gómez, and Omar Rojas. "Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles." Sensors 22, no. 5 (2022): 1987. http://dx.doi.org/10.3390/s22051987.
Full textEsha, Kumar. "Securing Graphical Password Techniques from Shoulder Surfing and Camera Based Attacks." International Journal of Recent Technology and Engineering (IJRTE) 11, no. 3 (2022): 1–5. https://doi.org/10.35940/ijrte.B7164.0911322.
Full textKalimuthu, P., and A. Justin Diraviam. "Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 130–34. http://dx.doi.org/10.51983/ajcst-2012.1.1.1691.
Full textTaware, Shruti. "A Survey on Graphical Password Strategy Authentication." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35080.
Full textAbdalkareem, Zahraa A., Omar Z. Akif, Firas A. Abdulatif, A. Amiza, and Phaklen Ehkan. "Graphical password based mouse behavior technique." Journal of Physics: Conference Series 1755, no. 1 (2021): 012021. http://dx.doi.org/10.1088/1742-6596/1755/1/012021.
Full textChopra, Aakanksha, Megha Gupta, and Vivek Kumar Sharma. "A Hybrid Graphical Password Technique for Mobile Data Security Based on Direction." ECS Transactions 107, no. 1 (2022): 19105–29. http://dx.doi.org/10.1149/10701.19105ecst.
Full textKowsalya, Ms, Mr Yogalingam, Mr Sanjay Prasath, and Mr Surya Prakash. "Click and Session based Captcha as Graphical Password Authentication Process using AI Technology." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1631–35. http://dx.doi.org/10.22214/ijraset.2023.49669.
Full textSaadi, Zena M., Ahmed T. Sadiq, and Omar Z. Akif. "Graphical User Authentication Algorithms Based on Recognition." ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY 12, no. 2 (2024): 79–93. http://dx.doi.org/10.14500/aro.11603.
Full textPriyanka Shingate, Shruti Taware, Pratik Deshpande, Tanaya Deshmukh, and Anshu Thakur. "A Research on Graphical Password Strategy Authentication." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (2024): 237–48. http://dx.doi.org/10.32628/ijsrset24113120.
Full text