Is bigger better? Comparing user-generated passwords on 3x3 vs. 4x4 grid sizes for android's pattern unlock
Android's graphical authentication mechanism requires users to unlock their devices by"
drawing" a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior …
drawing" a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior …
[PDF][PDF] A survey on the use of graphical passwords in security.
H Gao, W Jia, F Ye, L Ma - J. Softw., 2013 - jsoftware.us
Beginning around 1996, numerous graphical password schemes have been proposed,
motivated by improving password usability and security, two key factors in password scheme …
motivated by improving password usability and security, two key factors in password scheme …
Cueauth: Comparing touch, mid-air gestures, and gaze for cue-based authentication on situated displays
Secure authentication on situated displays (eg, to access sensitive information or to make
purchases) is becoming increasingly important. A promising approach to resist shoulder …
purchases) is becoming increasingly important. A promising approach to resist shoulder …
A video-based attack for android pattern lock
Pattern lock is widely used for identification and authentication on Android devices. This
article presents a novel video-based side channel attack that can reconstruct Android …
article presents a novel video-based side channel attack that can reconstruct Android …
CapSoles: who is walking on what kind of floor?
Foot interfaces, such as pressure-sensitive insoles, still yield unused potential such as for
implicit interaction. In this paper, we introduce CapSoles, enabling smart insoles to implicitly …
implicit interaction. In this paper, we introduce CapSoles, enabling smart insoles to implicitly …
Graphical password-based user authentication with free-form doodles
M Martinez-Diaz, J Fierrez… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
User authentication using simple gestures is now common in portable devices. In this work,
authentication with free-form sketches is studied. Verification systems using dynamic time …
authentication with free-form sketches is studied. Verification systems using dynamic time …
A graphical password based system for small mobile devices
Passwords provide security mechanism for authentication and protection services against
unwanted access to resources. A graphical based password is one promising alternatives of …
unwanted access to resources. A graphical based password is one promising alternatives of …
Exploring the vulnerabilities and advantages of swipe or pattern authentication in virtual reality (vr)
Virtual reality applications are carving out a new niche within the entertainment and
business user-sphere, therefore reliable security and usability are essential to achieving …
business user-sphere, therefore reliable security and usability are essential to achieving …
In the quest to protect users from {Side-Channel} attacks–a {User-Centred} design space to mitigate thermal attacks on public payment terminals
Thermal attacks are an emerging threat that enables the reconstruction of user input after
interaction with a device by analysing heat traces. There are several ways to protect users …
interaction with a device by analysing heat traces. There are several ways to protect users …
[HTML][HTML] Securing access to internet of medical things using a graphical-password-based user authentication scheme
Digital healthcare services have seen significant growth in this decade and many new
technologies have been thoroughly examined to provide efficient services through secure …
technologies have been thoroughly examined to provide efficient services through secure …