Khalil Hamdi Ateyeh Al-Shqeerat*
Computer Systems Science and Engineering, Vol.44, No.3, pp. 2095-2107, 2023, DOI:10.32604/csse.2023.028975
- 01 August 2022
Abstract Most remote systems require user authentication to access resources. Text-based passwords are still widely used as a standard method of user authentication. Although conventional text-based passwords are rather hard to remember, users often write their passwords down in order to compromise security. One of the most complex challenges users may face is posting sensitive data on external data centers that are accessible to others and do not be controlled directly by users. Graphical user authentication methods have recently been proposed to verify the user identity. However, the fundamental limitation of a graphical password is that… More >