Eye gesture blink password: a new authentication system with high memorable and maximum password length
H Salehifar, P Bayat, MA Majd - Multimedia Tools and Applications, 2019 - Springer
Authentication systems in which eye is used for entering the password are categorized into
two gaze-based and gesture-based groups. In the accurate point-of-regard gaze …
two gaze-based and gesture-based groups. In the accurate point-of-regard gaze …
[HTML][HTML] An XML transformed method to improve effectiveness of graphical password authentication
K Juneja - Journal of King Saud University-Computer and …, 2020 - Elsevier
Graphical passwords are already examined as the reliable authentication scheme over the
textual passwords. These passwords promise the better robustness and memorability …
textual passwords. These passwords promise the better robustness and memorability …
I (don't) see what you typed there! Shoulder-surfing resistant password entry on gamepads
Using gamepad-driven devices like games consoles is an activity frequently shared with
others. Thus, shoulder-surfing is a serious threat. To address this threat, we present the first …
others. Thus, shoulder-surfing is a serious threat. To address this threat, we present the first …
Safetypin: Secure pin entry through eye tracking
When a user enters a personal identification number (PIN) into an automated teller machine
or a point of sale terminal, there is a risk of some one watching from behind, trying to guess …
or a point of sale terminal, there is a risk of some one watching from behind, trying to guess …
CUE: counterfeit-resistant usable eye movement-based authentication via oculomotor plant characteristics and complex eye movement patterns
OV Komogortsev, A Karpov… - … Technologies for Global …, 2012 - spiedigitallibrary.org
The widespread use of computers throughout modern society introduces the necessity for
usable and counterfeit-resistant authentication methods to ensure secure access to personal …
usable and counterfeit-resistant authentication methods to ensure secure access to personal …
Are they actually looking? identifying smartphones shoulder surfing through gaze estimation
A Saad, DH Elkafrawy, S Abdennadher… - ACM symposium on …, 2020 - dl.acm.org
Mobile devices have evolved to be a crucial part of our everyday lives. However, they are
subject to different types of user-centered attacks such as shoulder surfing attacks. Previous …
subject to different types of user-centered attacks such as shoulder surfing attacks. Previous …
A novel non-intrusive user authentication method based on touchscreen of smartphones
CC Lin, CC Chang, D Liang - 2013 International Symposium on …, 2013 - ieeexplore.ieee.org
In recent years, the functionality of smartphones has been rapidly improved, then, the
smartphones are not only used for telecommunication but also for various applications, such …
smartphones are not only used for telecommunication but also for various applications, such …
Exploring the potential of geopass: A geographic location-password scheme
MN Al-Ameen, M Wright - Interacting with Computers, 2017 - academic.oup.com
Password schemes based on online map locations are an emerging topic in authentication
research. GeoPass is a promising such scheme, as it provides satisfactory resilience against …
research. GeoPass is a promising such scheme, as it provides satisfactory resilience against …
Token-based graphical password authentication
JC Gyorffy, AF Tappenden, J Miller - International Journal of Information …, 2011 - Springer
Given that phishing is an ever-increasing problem, a better authentication system is
required. We propose a system that uses a graphical password deployed from a Trojan and …
required. We propose a system that uses a graphical password deployed from a Trojan and …
Baseline measurements of shoulder surfing analysis and comparability for smartphone unlock authentication
In this paper, we describe a novel approach to measure the susceptibility of smartphone
unlock authentication to shoulder surfing attacks. In our methodology, participants play the …
unlock authentication to shoulder surfing attacks. In our methodology, participants play the …