References
- Almulhem, A. (February 21–23 2011). A graphical password authentication system World Congress on Internet Security (WorldCIS-2011).
- ArunPrakash, M., & Gokul, T. R. (2011). Network security-overcome password hacking through graphical password authentication National Conference on Innovations in Emerging Technology, 2011 (pp. 43–48). Erode, India, Tamil Nadu, India.
- Asmat, N., & Qasirrf, H. S. A. (2019). Conundrum-pass: A new graphical password approach 2nd International Conference on Communication, Computing and Digital systems (C-CODE), Islamabad, Pakistan, 2019 (pp. 282–287).
- Doiphode, Sh., Jadhav, J., Shelke, P., Pokale, M. S., et al. (February 24 2015). Novel security method using captcha as graphical password. International Journal of Emerging Engineering Research and Technology, 3 no. 2, 18.
- Eljetlawi, M., & Ithnin, N. (2008). Graphical password: Comprehensive study of the usability features of the recognition base graphical password methods Third International Conference on Convergence and Hybrid Information Technology, Busan, 2008 (pp. 1137–1143).
- Glory, F. Z., Ul Aftab, A., Tremblay-Savard, O., & Mohammed, N. (2019). Strong password generation based on user inputs, 2019 (pp. 0416–0423). IEEE Publications 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
- Joshi, A. M., & Muniyal, B. (2018). Authentication using text and graphical password International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, 2018 (pp. 381–386).
- Mathapati, M., Kumaran, T. S., Kumar, A. K., & Kumar, S. V. (2017). Secure online examination by using graphical own image password scheme. Energy Materials (ICSTM), Chennai IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, 2017 (pp. 160–164).
- Yang, G. (2017). Pass Positions: A secure and user-friendly graphical password scheme 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, 2017 (pp. 1–5).
- Yang, G.-C., & Kim, H. (2014). A New Graphical Password Scheme based on Universal Design. Journal of Digital Convergence, 12(5), 231–238. https://doi.org/https://doi.org/10.14400/JDC.2014.12.5.231.
- Garg, R. et al. (2021) User validation and exchange using 3 image SHA random key and fingerprint, Jetir.org, Vol.8, Issue 4, page no.399-404
- Yao, B., Sun, H., Zhao, M., Li, J., Yan, G., & Yao, B. On coloring/ labelling graphical groups for creating new graphical passwords. (2017). IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). Chengdu, China, 2017, pp. 1371–1375.
- Hyun-Chul Jung and Kwang-Kyu Seo, “Jobs and Potential Threat Assessment for Continuous Provision of Cloud Computing Services”, Journal of System and Management Sciences, Vol. 10 (2020) No. 4, pp. 45-61.
- Lemnouar, N. (2022). Security limitations of Shamir’s secret sharing. Journal of Discrete Mathematical Sciences & Cryptography, 1–13. doi: https://doi.org/10.1080/09720529.2021.1961902
- Ebong, J., & Babu, G. (2020). Demand for credit in high-density markets in Kampala: Application of digital lending and implication for product innovation. Journal of International Studies, 13(4), 295–313. doi:https://doi.org/10.14254/2071-8330.2020/13-4/21