Eye gesture blink password: a new authentication system with high memorable and maximum password length

H Salehifar, P Bayat, MA Majd - Multimedia Tools and Applications, 2019 - Springer
Authentication systems in which eye is used for entering the password are categorized into
two gaze-based and gesture-based groups. In the accurate point-of-regard gaze …

[HTML][HTML] An XML transformed method to improve effectiveness of graphical password authentication

K Juneja - Journal of King Saud University-Computer and …, 2020 - Elsevier
Graphical passwords are already examined as the reliable authentication scheme over the
textual passwords. These passwords promise the better robustness and memorability …

I (don't) see what you typed there! Shoulder-surfing resistant password entry on gamepads

P Mayer, N Gerber, B Reinheimer, P Rack… - Proceedings of the …, 2019 - dl.acm.org
Using gamepad-driven devices like games consoles is an activity frequently shared with
others. Thus, shoulder-surfing is a serious threat. To address this threat, we present the first …

Safetypin: Secure pin entry through eye tracking

M Seetharama, V Paelke, C Röcker - … Conference, HAS 2015, Held as Part …, 2015 - Springer
When a user enters a personal identification number (PIN) into an automated teller machine
or a point of sale terminal, there is a risk of some one watching from behind, trying to guess …

CUE: counterfeit-resistant usable eye movement-based authentication via oculomotor plant characteristics and complex eye movement patterns

OV Komogortsev, A Karpov… - … Technologies for Global …, 2012 - spiedigitallibrary.org
The widespread use of computers throughout modern society introduces the necessity for
usable and counterfeit-resistant authentication methods to ensure secure access to personal …

Are they actually looking? identifying smartphones shoulder surfing through gaze estimation

A Saad, DH Elkafrawy, S Abdennadher… - ACM symposium on …, 2020 - dl.acm.org
Mobile devices have evolved to be a crucial part of our everyday lives. However, they are
subject to different types of user-centered attacks such as shoulder surfing attacks. Previous …

A novel non-intrusive user authentication method based on touchscreen of smartphones

CC Lin, CC Chang, D Liang - 2013 International Symposium on …, 2013 - ieeexplore.ieee.org
In recent years, the functionality of smartphones has been rapidly improved, then, the
smartphones are not only used for telecommunication but also for various applications, such …

Exploring the potential of geopass: A geographic location-password scheme

MN Al-Ameen, M Wright - Interacting with Computers, 2017 - academic.oup.com
Password schemes based on online map locations are an emerging topic in authentication
research. GeoPass is a promising such scheme, as it provides satisfactory resilience against …

Token-based graphical password authentication

JC Gyorffy, AF Tappenden, J Miller - International Journal of Information …, 2011 - Springer
Given that phishing is an ever-increasing problem, a better authentication system is
required. We propose a system that uses a graphical password deployed from a Trojan and …

Baseline measurements of shoulder surfing analysis and comparability for smartphone unlock authentication

JT Davin, AJ Aviv, F Wolf, R Kuber - Proceedings of the 2017 CHI …, 2017 - dl.acm.org
In this paper, we describe a novel approach to measure the susceptibility of smartphone
unlock authentication to shoulder surfing attacks. In our methodology, participants play the …