Is bigger better? Comparing user-generated passwords on 3x3 vs. 4x4 grid sizes for android's pattern unlock

AJ Aviv, D Budzitowski, R Kuber - … of the 31st Annual Computer Security …, 2015 - dl.acm.org
Android's graphical authentication mechanism requires users to unlock their devices by"
drawing" a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior …

[PDF][PDF] A survey on the use of graphical passwords in security.

H Gao, W Jia, F Ye, L Ma - J. Softw., 2013 - jsoftware.us
Beginning around 1996, numerous graphical password schemes have been proposed,
motivated by improving password usability and security, two key factors in password scheme …

Cueauth: Comparing touch, mid-air gestures, and gaze for cue-based authentication on situated displays

M Khamis, L Trotter, V Mäkelä, E Zezschwitz… - Proceedings of the …, 2018 - dl.acm.org
Secure authentication on situated displays (eg, to access sensitive information or to make
purchases) is becoming increasingly important. A promising approach to resist shoulder …

A video-based attack for android pattern lock

G Ye, Z Tang, D Fang, X Chen, W Wolff… - ACM Transactions on …, 2018 - dl.acm.org
Pattern lock is widely used for identification and authentication on Android devices. This
article presents a novel video-based side channel attack that can reconstruct Android …

CapSoles: who is walking on what kind of floor?

DJC Matthies, T Roumen, A Kuijper… - Proceedings of the 19th …, 2017 - dl.acm.org
Foot interfaces, such as pressure-sensitive insoles, still yield unused potential such as for
implicit interaction. In this paper, we introduce CapSoles, enabling smart insoles to implicitly …

Graphical password-based user authentication with free-form doodles

M Martinez-Diaz, J Fierrez… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
User authentication using simple gestures is now common in portable devices. In this work,
authentication with free-form sketches is studied. Verification systems using dynamic time …

A graphical password based system for small mobile devices

WZ Khan, MY Aalsalem, Y Xiang - arXiv preprint arXiv:1110.3844, 2011 - arxiv.org
Passwords provide security mechanism for authentication and protection services against
unwanted access to resources. A graphical based password is one promising alternatives of …

Exploring the vulnerabilities and advantages of swipe or pattern authentication in virtual reality (vr)

I Olade, HN Liang, C Fleming… - Proceedings of the 2020 …, 2020 - dl.acm.org
Virtual reality applications are carving out a new niche within the entertainment and
business user-sphere, therefore reliable security and usability are essential to achieving …

In the quest to protect users from {Side-Channel} attacks–a {User-Centred} design space to mitigate thermal attacks on public payment terminals

K Marky, S Macdonald, Y Abdrabou… - 32nd usenix security …, 2023 - usenix.org
Thermal attacks are an emerging threat that enables the reconstruction of user input after
interaction with a device by analysing heat traces. There are several ways to protect users …

[HTML][HTML] Securing access to internet of medical things using a graphical-password-based user authentication scheme

MA Khan, IU Din, A Almogren - Sustainability, 2023 - mdpi.com
Digital healthcare services have seen significant growth in this decade and many new
technologies have been thoroughly examined to provide efficient services through secure …