Related references
Note: Only part of the references are listed.Advanced lightweight multi-factor remote user authentication scheme for cloud-IoT applications
Geeta Sharma et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)
Provably secure anonymous three-factor authentication scheme for multi-server environments
Dongqing Xu et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
BraillePassword: accessible web authentication technique on touchscreen devices
Mrim Alnfiai et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
A continuous smartphone authentication method based on gait patterns and keystroke dynamics
Imane Lamiche et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
Finger knuckle biometrics - A review
K. Usha et al.
COMPUTERS & ELECTRICAL ENGINEERING (2015)
Multi-modal decision fusion for continuous authentication
Lex Fridman et al.
COMPUTERS & ELECTRICAL ENGINEERING (2015)
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks
Fan Wu et al.
COMPUTERS & ELECTRICAL ENGINEERING (2015)
Security Busters: Web browser security vs. rogue sites
Nikos Virvilis et al.
COMPUTERS & SECURITY (2015)
Hierarchy of users' web passwords: Perceptions, practices and susceptibilities
S. M. Taiabul Haque et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2014)
Shoulder-surfing-proof graphical password authentication scheme
Tzong-Sun Wu et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2014)
Analysis of a two-factor graphical password scheme
Luigi Catuogno et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2014)
A survey of emerging threats in cybersecurity
Julian Jang-Jaccard et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2014)
A review of biometric technology along with trends and prospects
J. A. Unar et al.
PATTERN RECOGNITION (2014)
MTi: A method for user identification for multitouch displays
Bojan Blazica et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2013)
Using trusted computing for privacy preserving keystroke-based authentication in smartphones
Mohammad Nauman et al.
TELECOMMUNICATION SYSTEMS (2013)
A Survey of Keystroke Dynamics Biometrics
Pin Shen Teh et al.
SCIENTIFIC WORLD JOURNAL (2013)
Graphical Passwords: Learning from the First Twelve Years
Robert Biddle et al.
ACM COMPUTING SURVEYS (2012)
A crypto-biometric scheme based on iris-templates with fuzzy extractors
R. Alvarez Marino et al.
INFORMATION SCIENCES (2012)
Rational security: Modelling everyday password use
Geoffrey B. Duggan et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2012)
Phase congruency induced local features for finger-knuckle-print recognition
Lin Zhang et al.
PATTERN RECOGNITION (2012)
Ear recognition based on local information fusion
Li Yuan et al.
PATTERN RECOGNITION LETTERS (2012)
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
Joseph Bonneau et al.
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects
Robert Biddle et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)
Token-based graphical password authentication
John Charles Gyorffy et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2011)
Keystroke dynamics in password authentication enhancement
Pin Shen Teh et al.
EXPERT SYSTEMS WITH APPLICATIONS (2010)
Feasibility study of tactile-based authentication
Ravi Kuber et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2010)
Dynamic tongueprint: A novel biometric identifier
David Zhang et al.
PATTERN RECOGNITION (2010)
A comprehensive simulation tool for the analysis of password policies
Richard Shay et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2009)
Image understanding for iris biometrics: A survey
Kevin W. Bowyer et al.
COMPUTER VISION AND IMAGE UNDERSTANDING (2008)
Improvement of keystroke data quality through artificial rhythms and cues
Pilsung Kang et al.
COMPUTERS & SECURITY (2008)
The seven flaws of identity management - Usability and security challenges
Rachna Dhamija et al.
IEEE SECURITY & PRIVACY (2008)
eigenPulse: Robust human identification from cardiovascular function
John M. Irvine et al.
PATTERN RECOGNITION (2008)
Improving password security and memorability to protect personal and organizational information
Kim-Phuong L. Vu et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2007)
The usability of passphrases for authentication: An empirical field study
Mark Keith et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2007)
PassPoints: Design and longitudinal evaluation of a graphical password system
S Wiedenbeck et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2005)
Password memorability and security: Empirical results
J Yan et al.
IEEE SECURITY & PRIVACY (2004)
Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security
MA Sasse et al.
BT TECHNOLOGY JOURNAL (2001)