Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
Mobile security: Threats and best practices
P Weichbroth, Ł Łysik - Mobile Information Systems, 2020 - Wiley Online Library
Communicating mobile security threats and best practices has become a central objective
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …
Quantifying the security of graphical passwords: The case of android unlock patterns
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …
of text-based passwords, inspired by research that shows that the graphical memory of …
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …
password scheme, including usability and security evaluations, and implementation …
Captcha as graphical passwords—A new security primitive based on hard AI problems
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
Multiple password interference in text passwords and click-based graphical passwords
The underlying issues relating to the usability and security of multiple passwords are largely
unexplored. However, we know that people generally have difficulty remembering multiple …
unexplored. However, we know that people generally have difficulty remembering multiple …
Purely automated attacks on passpoints-style graphical passwords
PC Van Oorschot, A Salehi-Abari… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
We introduce and evaluate various methods for purely automated attacks against
PassPoints-style graphical passwords. For generating these attacks, we introduce a graph …
PassPoints-style graphical passwords. For generating these attacks, we introduce a graph …
Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords
We present Cued Gaze-Points (CGP) as a shoulder-surfing resistant cued-recall graphical
password scheme where users gaze instead of mouse-click. This approach has several …
password scheme where users gaze instead of mouse-click. This approach has several …
Exploiting predictability in click-based graphical passwords
PC van Oorschot, J Thorpe - Journal of Computer Security, 2011 - content.iospress.com
We provide an in-depth study of the security of click-based graphical password schemes like
PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and …
PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and …
EvoPass: Evolvable graphical password against shoulder-surfing attacks
The passwords for authenticating users are susceptible to shoulder-surfing attacks in which
attackers learn users' passwords through direct observations without any technical support …
attackers learn users' passwords through direct observations without any technical support …