Usability and security evaluation of GeoPass: a geographic location-password scheme
J Thorpe, B MacRae, A Salehi-Abari - … of the Ninth symposium on usable …, 2013 - dl.acm.org
We design, implement, and evaluate GeoPass: an interface for digital map-based
authentication where a user chooses a place as his or her password (ie, a" location …
authentication where a user chooses a place as his or her password (ie, a" location …
PassBYOP: bring your own picture for securing graphical passwords
PassBYOP is a new graphical password scheme for public terminals that replaces the static
digital images typically used in graphical password systems with personalized physical …
digital images typically used in graphical password systems with personalized physical …
User-centred multimodal authentication: securing handheld mobile devices using gaze and touch input
Handheld mobile devices store a plethora of sensitive data, such as private emails, personal
messages, photos, and location data. Authentication is essential to protect access to …
messages, photos, and location data. Authentication is essential to protect access to …
Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation
Picture gesture authentication has been recently introduced as an alternative login
experience to text-based password on touch-screen devices. In particular, the newly on …
experience to text-based password on touch-screen devices. In particular, the newly on …
Gaze-based password authentication through automatic clustering of gaze points
Researchers have proposed systems in which users utilize an eye tracker to enter
passwords by merely looking at the proper symbols on the computer monitor in the …
passwords by merely looking at the proper symbols on the computer monitor in the …
A stealth approach to usable security: helping IT security managers to identify workable security solutions
S Parkin, A Van Moorsel, P Inglesant… - Proceedings of the 2010 …, 2010 - dl.acm.org
Recent advances in the research of usable security have produced many new security
mechanisms that improve usability. However, these mechanisms have not been widely …
mechanisms that improve usability. However, these mechanisms have not been widely …
Graphical password: prevent shoulder-surfing attack using digraph substitution rules
In this paper, a new scheme that uses digraph substitution rules to conceal the mechanism
or activity required to derive password-images is proposed. In the proposed method, a user …
or activity required to derive password-images is proposed. In the proposed method, a user …
Obfuscation of sensitive human-perceptual output
AIA Wang, M Mitchell, P Reiher - US Patent 10,025,952, 2018 - Google Patents
The present invention includes a system and method for defending against unwanted
observations of the information conveyed by electronic devices. The system allows users to …
observations of the information conveyed by electronic devices. The system allows users to …
GestureMeter: Design and Evaluation of a Gesture Password Strength Meter
Gestures drawn on touchscreens have been proposed as an authentication method to
secure access to smartphones. They provide good usability and a theoretically large …
secure access to smartphones. They provide good usability and a theoretically large …
Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks
A Sahami Shirazi, P Moghadam, H Ketabdar… - Proceedings of the …, 2012 - dl.acm.org
Secure user authentication on mobile phones is crucial, as they store highly sensitive
information. Common approaches to authenticate a user on a mobile phone are based …
information. Common approaches to authenticate a user on a mobile phone are based …