Journal articles on the topic 'Graphical Password Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Graphical Password Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bhardwaj, Utkarsh. "Graphical Password Authentication." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 4656–61. http://dx.doi.org/10.22214/ijraset.2023.51883.
Full textTaware, Shruti. "A Survey on Graphical Password Strategy Authentication." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35080.
Full textSekhar Reddy, Y. Chandra, M. Venkateswara Rao, M. Kameswara Rao, C. V. Phaneendra Kumar, and A. Anil Sai. "Graphical Password Using Captcha." International Journal of Advances in Applied Sciences 5, no. 2 (2016): 94. http://dx.doi.org/10.11591/ijaas.v5.i2.pp94-100.
Full textNandi, Pathik, and Dr Preeti Savant. "Graphical Password Authentication System." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1759–65. http://dx.doi.org/10.22214/ijraset.2022.41621.
Full textGopalakrishnan, Adithya, Anugraha K Anil, Anu Thomas, Devika Vijayan ,, and Mafnitha K K. "Graphical Password Authentication: Strengthening Security in the Digital Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43155.
Full textDias, Norman Ignatius, Mouleeswaran Singanallur Kumaresan, and Reeja Sundaran Rajakumari. "Deep learning based graphical password authentication approach against shoulder-surfing attacks." Multiagent and Grid Systems 19, no. 1 (2023): 99–115. http://dx.doi.org/10.3233/mgs-230024.
Full textPriyanka Shingate, Shruti Taware, Pratik Deshpande, Tanaya Deshmukh, and Anshu Thakur. "A Research on Graphical Password Strategy Authentication." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 3 (2024): 237–48. http://dx.doi.org/10.32628/ijsrset24113120.
Full textProf., Sarita T. Sawale, Kalyani J. Anpat Ms., and Priyanka Savaji Ms. "SURVEY OF GRAPHICAL PASSWORD." International Journal of Advances in Engineering & Scientific Research 2, no. 3 (2015): 01–09. https://doi.org/10.5281/zenodo.10725847.
Full textJaiswal, Sarveshkumar, Tejas Chore, Kamalesh Patil, and Kunal Jagtap. "Authentication Based on Image Password." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3941–46. http://dx.doi.org/10.22214/ijraset.2023.52462.
Full textJaiswal, Sarveshkumar, Tejas Chore, Kamalesh Patil, and Kunal Jagtap. "Authentication Based on Image Password." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3910–17. http://dx.doi.org/10.22214/ijraset.2023.52227.
Full textJirjees, Seerwan Waleed, Ali Majeed Mahmood, and Ahmed Raoof Nasser. "Passnumbers: An Approach of Graphical Password Authentication Based on Grid Selection." International Journal of Safety and Security Engineering 12, no. 1 (2022): 21–29. http://dx.doi.org/10.18280/ijsse.120103.
Full textNguyen, Thanh An, and Yong Zeng. "A VISION BASED GRAPHICAL PASSWORD." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 14, no. 2 (2010): 43–52. http://dx.doi.org/10.3233/jid-2010-14204.
Full textLin, Tsung-Hung, Cheng-Chi Lee, Chwei-Shyong Tsai, and Shin-Dong Guo. "A tabular steganography scheme for graphical password authentication." Computer Science and Information Systems 7, no. 4 (2010): 823–41. http://dx.doi.org/10.2298/csis081223028l.
Full textSagar, U.P. Prashasthi, U.P. Pravardha Sagar, and Preeti Dubey. "Image-based Object-sequenced Graphical Password Authentication System." International Journal of Microsystems and IoT 2, no. 4 (2024): 730–44. https://doi.org/10.5281/zenodo.11651505.
Full textR, Sneha. "A Graphical Password Authentication System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30440.
Full textGolar, Priti C., and Rika Sharma. "An Advanced Knowledge Based Graphical Authentication Framework with Guaranteed Confidentiality and Integrity." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 720–30. http://dx.doi.org/10.17762/ijritcc.v11i8s.7676.
Full textPrashasthi, Sagar U. P., Sagar U. P. Pravardha, and P. Dubey. "Image-based Object-sequenced Graphical Password Authentication System." International Journal of Microsystems and IoT 2, no. 7 (2024): 1033–43. https://doi.org/10.5281/zenodo.13331483.
Full textKumar, Aayush, Keshav Kumar, Siddharth Shekhar Singh, and M. Vaneeta. "An Efficient Graphical Authentication System." Asian Journal of Science and Applied Technology 6, no. 1 (2017): 42–45. http://dx.doi.org/10.51983/ajsat-2017.6.1.937.
Full textWerner, Steffen, Christopher Hauck, and Marshall Masingale. "Password Entry Times for Recognition-based Graphical Passwords." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 755–59. http://dx.doi.org/10.1177/1541931213601173.
Full textSulochana, V. "Implementation of Chunks of Image Password in Cloud Computing System." Asian Journal of Computer Science and Technology 8, S1 (2019): 54–57. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1958.
Full textZhou, Zhili, Ching-Nung Yang, Yimin Yang, and Xingming Sun. "Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment." Complexity 2019 (November 16, 2019): 1–8. http://dx.doi.org/10.1155/2019/2875676.
Full textRangari, Mr Shantanu, and Prof K. R. Ingole. "Implementation of Graphical Password Authentication Technique for Security Using Cued Click Points Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1476–79. http://dx.doi.org/10.22214/ijraset.2022.41416.
Full textAnitha, M., and G. Saranya. "User Privileged CAPTCHA as Graphical Password for Multistage Authentication." International Journal of Advance Research and Innovation 3, no. 1 (2015): 28–33. http://dx.doi.org/10.51976/ijari.311505.
Full textShaik Mehboob Basha and K.Kumara Swamy. "Web Based Graphical Password Authentication System." international journal of engineering technology and management sciences 9, no. 2 (2025): 779–85. https://doi.org/10.46647/ijetms.2025.v09i02.099.
Full textAbhishek, Narayan Shah, Anand Dipti, Samanta Sabyasachi, and Dey Dipankar. "Graphical Password Authentication System Using Modified Intuitive Approach." International Journal of HIT Transaction on ECCN Vol. 7, no. 2A (2021) (2021): 64–71. https://doi.org/10.5281/zenodo.5893206.
Full textSantoso, Joseph Teguh, Budi Raharjo, and Agus Wibowo. "Combination of Alphanumeric Password and Graphic Authentication for Cyber Security." Journal of Internet Services and Information Security 14, no. 1 (2023): 16–36. http://dx.doi.org/10.58346/jisis.2024.i1.002.
Full textRoy, Indrani, Ajmerry Hossain, and SARKER TANVEER AHMED RUMEE. "Attacks on Graphical Password: A Study on Defense Mechanisms and Limitations." International Journal of Information Technology and Applied Sciences (IJITAS) 3, no. 4 (2021): 180–83. http://dx.doi.org/10.52502/ijitas.v3i4.201.
Full textKalimuthu, P., and A. Justin Diraviam. "Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 130–34. http://dx.doi.org/10.51983/ajcst-2012.1.1.1691.
Full textSri Ram Varma, D., K. Meghana, V. Sai Deepak, and R. Murugan. "Graphical password scheme to diminish shoulder surfing." International Journal of Engineering & Technology 7, no. 1.1 (2017): 234. http://dx.doi.org/10.14419/ijet.v7i1.1.9474.
Full textElugbadebo, O. J., A. A. Orunsolu, S. A. Akinyele, and S. I. Salawu. "AN EFFICIENT AND SECURED GRAPHICAL AUTHENTICATION SYSTEM." Acta Informatica Malaysia 6, no. 1 (2022): 17–21. http://dx.doi.org/10.26480/aim.01.2022.17.21.
Full textD., Loganathan, Kulsum Umme, Ahamed Arbaz, M. Sania, and S. Shakthi. "Survey of Graphical Password Authentication Systems Suitable for Android Application." Research and Applications of Web Development and Design 6, no. 1 (2023): 31–43. https://doi.org/10.5281/zenodo.7686988.
Full textAwan, Kamran Ahmad, Ikram Ud Din, Abeer Almogren, Neeraj Kumar, and Ahmad Almogren. "A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things." ACM Transactions on Internet Technology 22, no. 2 (2022): 1–28. http://dx.doi.org/10.1145/3433544.
Full textL.P.Ramyasri, P., D. Malathi, J. D. Dorathi Jayaseeli, and K. Senthilkumar. "Study and Development of Graphical Authentication System for Secure File Transmission." International Journal of Engineering & Technology 7, no. 4.10 (2018): 470. http://dx.doi.org/10.14419/ijet.v7i4.10.21042.
Full textYang, Gi-Chul, and . "A New Graphical Password System Using Intersecting Points in a Signature." International Journal of Engineering & Technology 7, no. 4.39 (2018): 61–64. http://dx.doi.org/10.14419/ijet.v7i4.39.23707.
Full textHamid, S., N. Z. Bawany, and S. Khan. "AcSIS: Authentication System Based on Image Splicing." Engineering, Technology & Applied Science Research 9, no. 5 (2019): 4808–12. http://dx.doi.org/10.48084/etasr.3060.
Full textHamid, Soomaiya, Narmeen Zakaria Bawany, and Shahzeb Khan. "AcSIS: Authentication System Based on Image Splicing." Engineering, Technology & Applied Science Research 9, no. 5 (2019): 4808–12. https://doi.org/10.5281/zenodo.3510300.
Full textLoganathan, D. "Graphical Password Authentication: Image Grid Based Digital Lock for Mobile Apps." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 4735–47. http://dx.doi.org/10.22214/ijraset.2023.52681.
Full textTUSHAR, R. MAHORE, and A.V.DEORANKAR PROF. "SECURE GRAPHICAL PASSWORD SCHEME." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 3 (2017): 144–47. https://doi.org/10.5281/zenodo.1463739.
Full textRangari, Mr Shantanu, and Prof K. R. Ingole. "Review Paper Graphical Password Authentication Technique for Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 1980–82. http://dx.doi.org/10.22214/ijraset.2022.40969.
Full textMaw, Maw Naing, and Win Ohnmar. "Graphical Password Authentication using image Segmentation for Web Based Applications." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1461–64. https://doi.org/10.5281/zenodo.3591236.
Full textHerrera-Macías, Joaquín Alberto, Carlos Miguel Legón-Pérez, Lisset Suárez-Plasencia, Luis Ramiro Piñeiro-Díaz, Omar Rojas, and Guillermo Sosa-Gómez. "Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points." Symmetry 13, no. 5 (2021): 777. http://dx.doi.org/10.3390/sym13050777.
Full textSaha, Hasi, Ganesh Chandra Saha, Roshidul H, and Zakirul Islsam. "USER AUTHENTICATION THROUGH CUED CLICK POINTS BASED GRAPHICAL PASSWORD." American Journal of Agricultural Science, Engineering, and Technology 3, no. 1 (2017): 1–12. http://dx.doi.org/10.54536/ajaset.v3i1.38.
Full textR, Poonkodi, Jawahar Sriraam S R, Deepakvel M, Gokulnath J, and Jagathishprabu S. "An Enhanced Security Model for Simple Reformation-Based Password Scheme using PHP." International Journal of Computer Science and Mobile Computing 11, no. 5 (2022): 40–50. http://dx.doi.org/10.47760/ijcsmc.2022.v11i05.004.
Full textF. Abbas, Safa, and Lahieb M. Jawad. "PASS POINT SELECTION OF AUTOMATIC GRAPHICAL PASSWORD AUTHENTICATION TECHNIQUE BASED ON HISTOGRAM METHOD." Iraqi Journal of Information and Communication Technology 6, no. 1 (2023): 28–39. http://dx.doi.org/10.31987/ijict.6.1.212.
Full textKhodadadi, Touraj, A. K. M. Muzahidul Islam, Sabariah Baharun, and Shozo Komaki. "Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2939. http://dx.doi.org/10.11591/ijece.v6i6.11227.
Full textKhodadadi, Touraj, A. K. M. Muzahidul Islam, Sabariah Baharun, and Shozo Komaki. "Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2939. http://dx.doi.org/10.11591/ijece.v6i6.pp2939-2948.
Full textKim, Si Wan, Hyun Yi Yi, Gun Il Ma, and Jeong Hyun Yi. "Shoulder-Surfing Resistant Smartphone Authentication Scheme Using Virtual Joystick." Applied Mechanics and Materials 284-287 (January 2013): 3497–501. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3497.
Full textJohnson, Korey, and Steffen Werner. "Memorability of Alphanumeric and Composite Scene Authentication (CSA) Passcodes Over Extended Retention Intervals." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, no. 5 (2007): 434–38. http://dx.doi.org/10.1177/154193120705100502.
Full textDeshmukh, P. S., Manish Dhakane, Atharv Ghute, Dipesh Gadge, and Sarthak Wankhade. "“Graphical Password Authentication using Blockchain”." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 3155–60. http://dx.doi.org/10.22214/ijraset.2024.60256.
Full textSuárez-Plasencia, Lisset, Joaquín Alberto Herrera-Macías, Carlos Miguel Legón-Pérez, Guillermo Sosa-Gómez, and Omar Rojas. "Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles." Sensors 22, no. 5 (2022): 1987. http://dx.doi.org/10.3390/s22051987.
Full text