{"id":"https://openalex.org/W2912624581","doi":"https://doi.org/10.1109/tce.2019.2895715","title":"g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices","display_name":"g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices","publication_year":2019,"publication_date":"2019-01-29","ids":{"openalex":"https://openalex.org/W2912624581","doi":"https://doi.org/10.1109/tce.2019.2895715","mag":"2912624581"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2019.2895715","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2019.2895715","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060146861","display_name":"Mudassar Ali Khan","orcid":"https://orcid.org/0000-0003-1615-4605"},"institutions":[{"id":"https://openalex.org/I2801349156","display_name":"University of Haripur","ror":"https://ror.org/05vtb1235","country_code":"PK","type":"education","lineage":["https://openalex.org/I2801349156"]},{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["PK","SA"],"is_corresponding":true,"raw_author_name":"Mudassar Ali Khan","raw_affiliation_strings":["Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","Department of Information Technology, The University of Haripur, Haripur, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Information Technology, The University of Haripur, Haripur, Pakistan","institution_ids":["https://openalex.org/I2801349156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068099757","display_name":"Ikram Ud Din","orcid":null},"institutions":[{"id":"https://openalex.org/I2801349156","display_name":"University of Haripur","ror":"https://ror.org/05vtb1235","country_code":"PK","type":"education","lineage":["https://openalex.org/I2801349156"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Ikram Ud Din","raw_affiliation_strings":["Department of Information Technology, The University of Haripur, Haripur, Pakistan"],"raw_orcid":"https://orcid.org/0000-0001-8896-547X","affiliations":[{"raw_affiliation_string":"Department of Information Technology, The University of Haripur, Haripur, Pakistan","institution_ids":["https://openalex.org/I2801349156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081051413","display_name":"Sultan Ullah","orcid":"https://orcid.org/0000-0002-5325-1319"},"institutions":[{"id":"https://openalex.org/I2801349156","display_name":"University of Haripur","ror":"https://ror.org/05vtb1235","country_code":"PK","type":"education","lineage":["https://openalex.org/I2801349156"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sultan Ullah Jadoon","raw_affiliation_strings":["Department of Information Technology, The University of Haripur, Haripur, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-5325-1319","affiliations":[{"raw_affiliation_string":"Department of Information Technology, The University of Haripur, Haripur, Pakistan","institution_ids":["https://openalex.org/I2801349156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072011650","display_name":"Muhammad Khurram Khan","orcid":"https://orcid.org/0000-0001-6636-0533"},"institutions":[{"id":"https://openalex.org/I2801349156","display_name":"University of Haripur","ror":"https://ror.org/05vtb1235","country_code":"PK","type":"education","lineage":["https://openalex.org/I2801349156"]},{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["PK","SA"],"is_corresponding":false,"raw_author_name":"Muhammad Khurram Khan","raw_affiliation_strings":["Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","Department of Information Technology, The University of Haripur, Haripur, Pakistan"],"raw_orcid":"https://orcid.org/0000-0001-6636-0533","affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Information Technology, The University of Haripur, Haripur, Pakistan","institution_ids":["https://openalex.org/I2801349156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Computer Science and Engineering Department, Qatar University, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0002-8972-8094","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059731290","display_name":"Kamran Ahmad Awan","orcid":"https://orcid.org/0000-0002-0038-3772"},"institutions":[{"id":"https://openalex.org/I2801349156","display_name":"University of Haripur","ror":"https://ror.org/05vtb1235","country_code":"PK","type":"education","lineage":["https://openalex.org/I2801349156"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Kamran Ahmad Awan","raw_affiliation_strings":["Department of Information Technology, The University of Haripur, Haripur, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, The University of Haripur, Haripur, Pakistan","institution_ids":["https://openalex.org/I2801349156"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5060146861"],"corresponding_institution_ids":["https://openalex.org/I2801349156","https://openalex.org/I28022161"],"apc_list":null,"apc_paid":null,"fwci":7.7518,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.97283933,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"65","issue":"2","first_page":"215","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8627450466156006},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7522081136703491},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6007310748100281},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5860409736633301},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5657873153686523},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.5315135717391968},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.483607679605484},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.453917533159256},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44621098041534424},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4281000792980194},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.3822813034057617},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.263761430978775}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8627450466156006},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7522081136703491},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6007310748100281},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5860409736633301},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5657873153686523},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.5315135717391968},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.483607679605484},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.453917533159256},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44621098041534424},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4281000792980194},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.3822813034057617},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.263761430978775},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tce.2019.2895715","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2019.2895715","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/13770","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/13770","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4924123542","display_name":null,"funder_award_id":"RG-1439-58","funder_id":"https://openalex.org/F4320335726","funder_display_name":"Deanship of Scientific Research, King Saud University"}],"funders":[{"id":"https://openalex.org/F4320335726","display_name":"Deanship of Scientific Research, King Saud University","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W78137777","https://openalex.org/W97603265","https://openalex.org/W1485033854","https://openalex.org/W1490930696","https://openalex.org/W1503108337","https://openalex.org/W1921097329","https://openalex.org/W1978075813","https://openalex.org/W2019017059","https://openalex.org/W2021011451","https://openalex.org/W2046378201","https://openalex.org/W2077414235","https://openalex.org/W2101753194","https://openalex.org/W2108525321","https://openalex.org/W2112767991","https://openalex.org/W2115218409","https://openalex.org/W2116264134","https://openalex.org/W2117906398","https://openalex.org/W2123144012","https://openalex.org/W2149161927","https://openalex.org/W2152337449","https://openalex.org/W2153305919","https://openalex.org/W2163391293","https://openalex.org/W2185770332","https://openalex.org/W2282193493","https://openalex.org/W2335110595","https://openalex.org/W2335888457","https://openalex.org/W2540231424","https://openalex.org/W2610727334","https://openalex.org/W2766977185","https://openalex.org/W6628932435","https://openalex.org/W6630133823","https://openalex.org/W6640284056","https://openalex.org/W6686545093"],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W1844709308","https://openalex.org/W2359085393","https://openalex.org/W2021087413","https://openalex.org/W2177391373","https://openalex.org/W2019897613","https://openalex.org/W1639969416","https://openalex.org/W2181536702","https://openalex.org/W4288057502","https://openalex.org/W2158072777"],"abstract_inverted_index":{"User":[0],"authentication":[1,25,118,177,239],"is":[2,6,26,38,208,231],"the":[3,12,45,63,69,147,161,164,197,202,223,228,237],"process":[4],"that":[5,30,227],"exercised":[7],"millions":[8],"of":[9,24,44,47,65,71,100,140,163,185,216],"times":[10],"around":[11],"globe":[13],"by":[14,195,211],"using":[15],"different":[16],"techniques":[17],"and":[18,109,115,156,199,220,222,234],"methods.":[19],"The":[20,205],"most":[21],"prominent":[22],"way":[23],"alphanumerical":[27,53],"password":[28,122,150],"forms":[29],"have":[31,55,145,169],"been":[32,124],"used":[33],"for":[34,59,102,129,142],"decades.":[35],"Authorized":[36],"access":[37],"becoming":[39],"a":[40,72,120,138,171,182,189],"challenging":[41],"issue":[42],"because":[43],"introduction":[46],"modern":[48],"technologies.":[49],"In":[50],"addition,":[51],"traditional":[52],"passwords":[54,90,93],"significant":[56],"security":[57,198],"issues,":[58],"example,":[60,103],"humans":[61],"forget":[62],"combination":[64],"keys":[66],"due":[67],"to":[68,87,97,160,192],"selection":[70],"difficult":[73],"key":[74,82],"combination.":[75],"Moreover,":[76],"when":[77],"they":[78],"choose":[79],"an":[80,113,135],"easy":[81,114],"combination,":[83],"this":[84,127],"helps":[85],"hackers":[86],"crack":[88],"their":[89],"easily.":[91],"Traditional":[92],"are":[94],"also":[95,209],"vulnerable":[96],"several":[98],"types":[99],"attacks,":[101],"dictionary":[104],"attack,":[105,108],"brute":[106],"force":[107],"malware.":[110],"To":[111],"provide":[112],"more":[116,232],"secure":[117,233],"technique,":[119,173],"graphical":[121,149,166,175],"has":[123],"introduced":[125,170],"in":[126,214,236],"paper":[128],"consumer":[130],"electronic":[131],"devices,":[132],"which":[133,180],"uses":[134],"image":[136],"or":[137],"set":[139,184],"images":[141,186],"authentication.":[143],"We":[144],"categorized":[146],"existing":[148,165],"methods":[151],"into":[152],"recognition-based,":[153],"cued-recall-based,":[154],"pure-recall-based,":[155],"hybrid":[157],"techniques.":[158],"Due":[159],"limitations":[162],"passwords,":[167],"we":[168],"new":[172],"named":[174],"random":[176],"technique":[178,207,230],"(gRAT),":[179],"generates":[181],"randomized":[183],"every":[187],"time":[188],"user":[190],"tries":[191],"authenticate":[193],"him/herself":[194],"maintaining":[196],"usability":[200],"at":[201],"same":[203],"time.":[204],"gRAT":[206],"tested":[210],"user-centric":[212],"evaluation":[213],"terms":[215],"security,":[217],"usability,":[218],"usefulness,":[219],"utility,":[221],"experimental":[224],"results":[225],"show":[226],"proposed":[229],"useful":[235],"real-life":[238],"applications.":[240]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
