Mali et al., 2023 - Google Patents
Improved pin entry method to prevent shoulder surfing attacksMali et al., 2023
View PDF- Document ID
- 9126550758291361641
- Author
- Mali Y
- Pawar M
- More A
- Shinde S
- Borate V
- Shirbhate R
- Publication year
- Publication venue
- 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)
External Links
Snippet
Remarkable recognizable proof numbers or (PINs) and passwords are striking and notable check methodologies utilized in different gadgets, for example, ATMs, cell phones, electronic passage locks, and that's just the beginning. Sadly, his traditional PIN passage method is …
- 238000000034 method 0 title abstract description 19
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mali et al. | Improved pin entry method to prevent shoulder surfing attacks | |
Mali et al. | Advanced pin entry method by resisting shoulder surfing attacks | |
CN102638447B (en) | Method and device for system login based on autonomously generated password of user | |
Mali et al. | Enhanced pin entry mechanism for ATM machine by defending shoulder surfing attacks | |
Sasse | Usability and trust in information systems | |
US8539574B2 (en) | User authentication and access control system and method | |
US20130263240A1 (en) | Method for authentication and verification of user identity | |
Kim et al. | A new shoulder-surfing resistant password for mobile environments | |
Abu-Shanab et al. | Security and Fraud Issues of E-banking | |
Zhu et al. | Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework | |
Nigam et al. | [Retracted] Biometric Authentication for Intelligent and Privacy‐Preserving Healthcare Systems | |
Ferbrache | Passwords are broken–the future shape of biometrics | |
Yan et al. | Leakage-resilient password entry: challenges, design, and evaluation | |
Ray et al. | GPOD: an efficient and secure graphical password authentication system by fast object detection | |
Kori et al. | Information security awareness among postgraduate students: a study of Mangalore university | |
Hasan et al. | A Review on Secure Authentication Mechanisms for Mobile Security | |
Ajiji | Internet of thing (IOT): data and information (gadget protection) | |
Mueller et al. | Machine Learning Security Principles | |
Singla et al. | Privacy Enhancement in Internet of Things (IoT) via mRMR for prevention and avoidance of data leakage | |
Yang et al. | Effective mobile web user fingerprinting via motion sensors | |
Di Campi | Password guessing: learn the nature of passwords by studying the human behavior | |
LIM | Multi-grid background Pass-Go | |
Nielson | Authentication Technology | |
Noah et al. | From PINs to Gestures: Analyzing Knowledge-Based Authentication Schemes for Augmented and Virtual Reality | |
Lott et al. | Improving customer authentication |