Increasing the security of gaze-based cued-recall graphical passwords using saliency masks
With computers being used ever more ubiquitously in situations where privacy is important,
secure user authentication is a central requirement. Gaze-based graphical passwords are a …
secure user authentication is a central requirement. Gaze-based graphical passwords are a …
User authentication on augmented reality display device
M Scavezze, J Scott, J Steed, I McIntyre… - US Patent …, 2015 - Google Patents
Embodiments are disclosed that relate to authenticating a user of a display device. For
example, one disclosed embodiment includes displaying one or more virtual images on the …
example, one disclosed embodiment includes displaying one or more virtual images on the …
Cueauth: Comparing touch, mid-air gestures, and gaze for cue-based authentication on situated displays
Secure authentication on situated displays (eg, to access sensitive information or to make
purchases) is becoming increasingly important. A promising approach to resist shoulder …
purchases) is becoming increasingly important. A promising approach to resist shoulder …
Just gaze and wave: Exploring the use of gaze and gestures for shoulder-surfing resilient authentication
Y Abdrabou, M Khamis, RM Eisa, S Ismail… - Proceedings of the 11th …, 2019 - dl.acm.org
Eye-gaze and mid-air gestures are promising for resisting various types of side-channel
attacks during authentication. However, to date, a comparison of the different authentication …
attacks during authentication. However, to date, a comparison of the different authentication …
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication
mechanisms are developed to overcome security problems of personal identification …
mechanisms are developed to overcome security problems of personal identification …
Gazeroomlock: Using gaze and head-pose to improve the usability and observation resistance of 3d passwords in virtual reality
Authentication has become an important component of Immersive Virtual Reality (IVR)
applications, such as virtual shopping stores, social networks, and games. Recent work …
applications, such as virtual shopping stores, social networks, and games. Recent work …
GTmoPass: two-factor authentication on public displays using gaze-touch passwords and personal mobile devices
As public displays continue to deliver increasingly private and personalized content, there is
a need to ensure that only the legitimate users can access private information in sensitive …
a need to ensure that only the legitimate users can access private information in sensitive …
PrivacyScout: Assessing vulnerability to shoulder surfing on mobile devices
One approach to mitigate shoulder surfing attacks on mobile devices is to detect the
presence of a bystander using the phone's front-facing camera. However, a person's face in …
presence of a bystander using the phone's front-facing camera. However, a person's face in …
Designing leakage-resilient password entry on head-mounted smart wearable glass devices
With the boom of Augmented Reality (AR) and Virtual Reality (VR) applications, head-
mounted smart wearable glass devices are becoming popular to help users access various …
mounted smart wearable glass devices are becoming popular to help users access various …
On the security of picture gesture authentication
Computing devices with touch-screens have experienced unprecedented growth in recent
years. Such an evolutionary advance has been facilitated by various applications that are …
years. Such an evolutionary advance has been facilitated by various applications that are …