Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
Continuous and transparent multimodal authentication: reviewing the state of the art
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …
online and via various Internet-enabled digital devices. Unfortunately, these activities …
Quantifying the security of graphical passwords: The case of android unlock patterns
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …
of text-based passwords, inspired by research that shows that the graphical memory of …
Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices
Graphical password systems based upon the recall and reproduction of visual patterns (eg
as seen on the Google Android platform) are assumed to have desirable usability and …
as seen on the Google Android platform) are assumed to have desirable usability and …
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Nowadays, touchscreen mobile phones make up a larger and larger share in the mobile
market. Users also often use their mobile phones (eg, Android phones) to store personal …
market. Users also often use their mobile phones (eg, Android phones) to store personal …
Back-of-device authentication on smartphones
A De Luca, E Von Zezschwitz, NDH Nguyen… - Proceedings of the …, 2013 - dl.acm.org
This paper presents BoD Shapes, a novel authentication method for smartphones that uses
the back of the device for input. We argue that this increases the resistance to shoulder …
the back of the device for input. We argue that this increases the resistance to shoulder …
Look into my Eyes! Can you guess my Password?
A De Luca, M Denzel, H Hussmann - … of the 5th Symposium on Usable …, 2009 - dl.acm.org
Authentication systems for public terminals and thus public spaces have to be fast, easy and
secure. Security is of utmost importance since the public setting allows manifold attacks from …
secure. Security is of utmost importance since the public setting allows manifold attacks from …
Dissecting pattern unlock: The effect of pattern strength meter on pattern selection
Pattern unlock is one of the entry protection mechanisms in Android system for unlocking the
screen. By connecting 4–9 dots in a 3× 3 grid, the user can set up an unlock pattern which is …
screen. By connecting 4–9 dots in a 3× 3 grid, the user can set up an unlock pattern which is …
A comparative usability study of two-factor authentication
Two-factor authentication (2F) aims to enhance resilience of password-based authentication
by requiring users to provide an additional authentication factor, eg, a code generated by a …
by requiring users to provide an additional authentication factor, eg, a code generated by a …