Abstract: We now know that the majority of computer security relies on passwords to verify and authenticate users. There are numerous proposed authentication methods, and the majority of them still ...