Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

Benchmarking touchscreen biometrics for mobile authentication

J Fierrez, A Pozo, M Martinez-Diaz… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
We study user interaction with touchscreens based on swipe gestures for personal
authentication. This approach has been analyzed only recently in the last few years in a …

BioTouchPass2: Touchscreen password biometrics using time-aligned recurrent neural networks

R Tolosana, R Vera-Rodriguez, J Fierrez… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Passwords are still used on a daily basis for all kind of applications. However, they are not
secure enough by themselves in many cases. This work enhances password scenarios …

No single silver bullet: Measuring the accuracy of password strength meters

D Wang, X Shan, Q Dong, Y Shen, C Jia - 32nd USENIX Security …, 2023 - usenix.org
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …

PassWalk: spatial authentication leveraging lateral shift and gaze on mobile headsets

A Kumar, LH Lee, J Chauhan, X Su… - Proceedings of the 30th …, 2022 - dl.acm.org
Secure and usable user authentication on mobile headsets is a challenging problem. The
miniature-sized touchpad on such devices becomes a hurdle to user interactions that impact …

BioTouchPass: Handwritten passwords for touchscreen biometrics

R Tolosana, R Vera-Rodriguez… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This work enhances traditional authentication systems based on Personal Identification
Numbers (PIN) and One-Time Passwords (OTP) through the incorporation of biometric …

[PDF][PDF] Secure blockchain-based data-sharing model and adoption among intelligence communities.

NAM Razali, WN Wan Muhamad, KK Ishak… - … Journal of Computer …, 2021 - researchgate.net
Data sharing among the intelligence communities is important to consolidate data analysis,
which will support decision-making process to preserve the security of the nation. Data …

GestureMeter: Design and Evaluation of a Gesture Password Strength Meter

E Cheon, JH Huh, I Oakley - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
Gestures drawn on touchscreens have been proposed as an authentication method to
secure access to smartphones. They provide good usability and a theoretically large …

Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform

KW Tse, K Hung - IET Biometrics, 2022 - Wiley Online Library
Diverse applications are used on mobile devices. Because of the increasing dependence on
information systems, immense amounts of personal and sensitive data are stored on mobile …

An energy-efficient accelerator based on hybrid CPU-FPGA devices for password recovery

P Liu, S Li, Q Ding - IEEE Transactions on Computers, 2018 - ieeexplore.ieee.org
Password recovery tools are needed to recover lost and forgotten passwords so as to regain
access to valuable information. As the process of password recovery can be extremely …