[PDF][PDF] Security in graphical authentication

RG Rittenhouse, JA Chaudry, M Lee - International Journal of …, 2013 - researchgate.net
Abstract Graphical Authentication Systems are a potential replacement or supplement for
conventional authentication systems. Several studies have suggested graphical …

Pure and cued recall-based graphical user authentication

M Masrom, F Towhidi… - … Conference on Application …, 2009 - ieeexplore.ieee.org
Nowadays, user authentication is one of the important topics in information security. Text-
based strong password schemes could provide with certain degree of security. However, the …

Exploring the use of discrete gestures for authentication

MK Chong, G Marsden - … -Computer Interaction–INTERACT 2009: 12th IFIP …, 2009 - Springer
Research in user authentication has been a growing field in HCI. Previous studies have
shown that peoples' graphical memory can be used to increase password memorability. On …

Are thermal attacks ubiquitous? When non-expert attackers use off the shelf thermal cameras

Y Abdrabou, Y Abdelrahman, A Ayman… - Proceedings of the …, 2020 - dl.acm.org
Recent work showed that using image processing techniques on thermal images taken by
high-end equipment reveals passwords entered on touchscreens and keyboards. In this …

Glasspass: Tapping gestures to unlock smart glasses

MDR Islam, D Lee, LS Jahan, I Oakley - Proceedings of the 9th …, 2018 - dl.acm.org
Wearable technologies such as smart-glasses can sense, store and display sensitive
personal contents. In order to protect this data, users need to securely authenticate to their …

A complete comparison on pure and cued recall-based graphical user authentication algorithms

AH Lashkari, R Saleh, F Towhidi… - … on Computer and …, 2009 - ieeexplore.ieee.org
Nowadays, user authentication is one of the important topics in information security. Strong
text-based password schemes could provide with certain degree of security. However, the …

Learning assigned secrets for unlocking mobile devices

S Schechter, J Bonneau - Eleventh Symposium On Usable Privacy and …, 2015 - usenix.org
Nearly all smartphones and tablets support unlocking with a short user-chosen secret: eg, a
numeric PIN or a pattern. To address users' tendency to choose guessable PINs and …

Usability of humanly computable passwords

S Samadi, S Vempala, A Kalai - … of the AAAI Conference on Human …, 2018 - ojs.aaai.org
Reusing passwords across multiple websites is a common practice that compromises
security. Recently, Blum and Vempala have proposed password strategies to help people …

BoD taps: an improved back-of-device authentication technique on smartphones

LA Leiva, A Català - Proceedings of the 16th international conference on …, 2014 - dl.acm.org
Previous work in the literature has shown that back-of-device (BoD) authentication is
significantly more secure than standard front-facing approaches. However, the only BoD …

The use of pseudo pressure in authenticating smartphone users

AS Arif, A Mazalek, W Stuerzlinger - Proceedings of the 11th International …, 2014 - dl.acm.org
In this article, we present a new user authentication technique for touchscreen-based
smartphone users that augments pseudo touch pressure as an extra security measure to the …