A gaze gesture-based user authentication system to counter shoulder-surfing attacks
Shoulder-surfing is the act of spying on an authorized user of a computer system with the
malicious intent of gaining unauthorized access. Current solutions to address shoulder …
malicious intent of gaining unauthorized access. Current solutions to address shoulder …
Multi-input user authentication on display device
M Scavezze, J Scott, J Steed, I McIntyre… - US Patent …, 2018 - Google Patents
Embodiments are disclosed that relate to authenticating a user of a display device. For
example, one disclosed embodiment includes displaying one or more virtual images on the …
example, one disclosed embodiment includes displaying one or more virtual images on the …
Comparing video based shoulder surfing with live simulation
We analyze the claims that video recreations of shoulder surfing attacks offer a suitable
alternative and a baseline, as compared to evaluation in a live setting. We recreated a …
alternative and a baseline, as compared to evaluation in a live setting. We recreated a …
EyeDecrypt—Private interactions in plain sight
We introduce EyeDecrypt, a novel technology for privacy-preserving human-computer
interaction. EyeDecrypt allows only authorized users to decipher data shown on a display …
interaction. EyeDecrypt allows only authorized users to decipher data shown on a display …
Private reader: Using eye tracking to improve reading privacy in public spaces
Reading in public spaces can often be tricky if we wish to keep the contents away from the
prying eye. We propose Private Reader, an eye-tracking approach towards maintaining …
prying eye. We propose Private Reader, an eye-tracking approach towards maintaining …
[PDF][PDF] Novel shoulder-surfing resistant authentication schemes using text-graphical passwords
K Rao, S Yalamanchili - International Journal of Information and …, 2012 - researchgate.net
There are many applications which require the user to be authenticated before being
permitted to perform certain tasks. Text password-based authentication is a popularly used …
permitted to perform certain tasks. Text password-based authentication is a popularly used …
The presentation effect on graphical passwords
J Thorpe, M Al-Badawi, B MacRae… - proceedings of the …, 2014 - dl.acm.org
We provide a simple yet powerful demonstration of how an unobtrusive change to a
graphical password interface can modify the distribution of user chosen passwords, and thus …
graphical password interface can modify the distribution of user chosen passwords, and thus …
Safe: Secure authentication with face and eyes
Face authentication is commonly offered as an alternative to passwords for device unlock.
However, available face authentication systems are vulnerable to simple spoofing attacks …
However, available face authentication systems are vulnerable to simple spoofing attacks …
Gazemeter: Exploring the usage of gaze behaviour to enhance password assessments
We investigate the use of gaze behaviour as a means to assess password strength as
perceived by users. We contribute to the effort of making users choose passwords that are …
perceived by users. We contribute to the effort of making users choose passwords that are …
Emerging NUI-based methods for user authentication: A new taxonomy and survey
As the convenience and cost benefits of natural user interface (NUI) technologies are
hastening their wide adoption, computing devices equipped with such interfaces are …
hastening their wide adoption, computing devices equipped with such interfaces are …