Usability and security evaluation of GeoPass: a geographic location-password scheme

J Thorpe, B MacRae, A Salehi-Abari - … of the Ninth symposium on usable …, 2013 - dl.acm.org
We design, implement, and evaluate GeoPass: an interface for digital map-based
authentication where a user chooses a place as his or her password (ie, a" location …

PassBYOP: bring your own picture for securing graphical passwords

A Bianchi, I Oakley, H Kim - IEEE Transactions on Human …, 2015 - ieeexplore.ieee.org
PassBYOP is a new graphical password scheme for public terminals that replaces the static
digital images typically used in graphical password systems with personalized physical …

User-centred multimodal authentication: securing handheld mobile devices using gaze and touch input

M Khamis, K Marky, A Bulling, F Alt - Behaviour & Information …, 2022 - Taylor & Francis
Handheld mobile devices store a plethora of sensitive data, such as private emails, personal
messages, photos, and location data. Authentication is essential to protect access to …

Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation

Z Zhao, GJ Ahn, H Hu - ACM Transactions on Information and System …, 2015 - dl.acm.org
Picture gesture authentication has been recently introduced as an alternative login
experience to text-based password on touch-screen devices. In particular, the newly on …

Gaze-based password authentication through automatic clustering of gaze points

J Weaver, K Mock, B Hoanca - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
Researchers have proposed systems in which users utilize an eye tracker to enter
passwords by merely looking at the proper symbols on the computer monitor in the …

A stealth approach to usable security: helping IT security managers to identify workable security solutions

S Parkin, A Van Moorsel, P Inglesant… - Proceedings of the 2010 …, 2010 - dl.acm.org
Recent advances in the research of usable security have produced many new security
mechanisms that improve usability. However, these mechanisms have not been widely …

Graphical password: prevent shoulder-surfing attack using digraph substitution rules

LY Por, CS Ku, A Islam, TF Ang - Frontiers of Computer Science, 2017 - Springer
In this paper, a new scheme that uses digraph substitution rules to conceal the mechanism
or activity required to derive password-images is proposed. In the proposed method, a user …

Obfuscation of sensitive human-perceptual output

AIA Wang, M Mitchell, P Reiher - US Patent 10,025,952, 2018 - Google Patents
The present invention includes a system and method for defending against unwanted
observations of the information conveyed by electronic devices. The system allows users to …

GestureMeter: Design and Evaluation of a Gesture Password Strength Meter

E Cheon, JH Huh, I Oakley - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
Gestures drawn on touchscreens have been proposed as an authentication method to
secure access to smartphones. They provide good usability and a theoretically large …

Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks

A Sahami Shirazi, P Moghadam, H Ketabdar… - Proceedings of the …, 2012 - dl.acm.org
Secure user authentication on mobile phones is crucial, as they store highly sensitive
information. Common approaches to authenticate a user on a mobile phone are based …