<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="19522" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/19522?output=omeka-xml" accessDate="2026-05-01T08:17:59+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="168930">
              <text>Enhancing Visual Passwords Using a Grid-Based Graphical Password Authentication to Mitigate Shoulder Surfing</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="168931">
              <text>Authentication; Graphical; Security; Shoulder-surfing; Usability</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="168932">
              <text>Surfing Shoulder Surfing is a secret phrase-based attack which is a serious worry of protection in data security. Alphanumeric passwords are more helpless to attacks like shoulder surfing, dictionary attacks, etc., than graphical passwords. The creation of more muddled, challenging to-break passwords can be made simpler for clients with graphical authentication by consolidating the visuals and memory-based strategies like recall and recognition. In an imaged-based password, the user can choose pixels from the image to use as a secret key in the grid-based strategy, the user-selected image would show up on the screen with a framework overlay on it, and the client can pick explicit lattices to set their secret phrase. Besides, graphical passwords are powerless against shoulder surfing attacks, and due to this, clients are given a one-time made password via email. We investigated the limitations of image-based and grid-based authentication techniques and propose a grid-based graphical authentication system that addresses the limitations of image-based and grid-based techniques. The results of the grid-based graphical technique, as well as the image-based and grid-based approaches, have likewise been differentiated and analyzed. The convenience objective of our authentication system is to assist users in making better password selections, hence boosting security and broadening the usable password field. This method can be employed in many different contexts, such as forensic labs, banking, military, and other scenarios.  The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="168933">
              <text>Mano Paul P.; Berin Jeba Jingle I.; Diana Jeba Jingle I.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="168934">
              <text>Lecture Notes in Networks and Systems, Vol-869 LNNS, pp. 447-455.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="168935">
              <text>Springer Science and Business Media Deutschland GmbH</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="168936">
              <text>2024-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="168937">
              <text>&lt;a href="https://doi.org/10.1007/978-981-99-9040-5_33" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1007/978-981-99-9040-5_33&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85190394685&amp;amp;doi=10.1007%2F978-981-99-9040-5_33&amp;amp;partnerID=40&amp;amp;md5=0f09a8ff750189fb39978b7373a3308e" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85190394685&amp;amp;doi=10.1007%2f978-981-99-9040-5_33&amp;amp;partnerID=40&amp;amp;md5=0f09a8ff750189fb39978b7373a3308e&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="168938">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="168939">
              <text>ISSN: 23673370; ISBN: 978-981999039-9</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="168940">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="168941">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="168942">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="168943">
              <text>Mano Paul P., Alliance University, Karnataka, Bengaluru, India; Berin Jeba Jingle I., Karunya Institute of Technology and Sciences, Tamil Nadu, Coimbatore, India; Diana Jeba Jingle I., Christ (Deemed to Be University), Karnataka, Bengaluru, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
