[PDF][PDF] Security in graphical authentication
RG Rittenhouse, JA Chaudry, M Lee - International Journal of …, 2013 - researchgate.net
Abstract Graphical Authentication Systems are a potential replacement or supplement for
conventional authentication systems. Several studies have suggested graphical …
conventional authentication systems. Several studies have suggested graphical …
Pure and cued recall-based graphical user authentication
M Masrom, F Towhidi… - … Conference on Application …, 2009 - ieeexplore.ieee.org
Nowadays, user authentication is one of the important topics in information security. Text-
based strong password schemes could provide with certain degree of security. However, the …
based strong password schemes could provide with certain degree of security. However, the …
Exploring the use of discrete gestures for authentication
MK Chong, G Marsden - … -Computer Interaction–INTERACT 2009: 12th IFIP …, 2009 - Springer
Research in user authentication has been a growing field in HCI. Previous studies have
shown that peoples' graphical memory can be used to increase password memorability. On …
shown that peoples' graphical memory can be used to increase password memorability. On …
Are thermal attacks ubiquitous? When non-expert attackers use off the shelf thermal cameras
Y Abdrabou, Y Abdelrahman, A Ayman… - Proceedings of the …, 2020 - dl.acm.org
Recent work showed that using image processing techniques on thermal images taken by
high-end equipment reveals passwords entered on touchscreens and keyboards. In this …
high-end equipment reveals passwords entered on touchscreens and keyboards. In this …
Glasspass: Tapping gestures to unlock smart glasses
Wearable technologies such as smart-glasses can sense, store and display sensitive
personal contents. In order to protect this data, users need to securely authenticate to their …
personal contents. In order to protect this data, users need to securely authenticate to their …
A complete comparison on pure and cued recall-based graphical user authentication algorithms
AH Lashkari, R Saleh, F Towhidi… - … on Computer and …, 2009 - ieeexplore.ieee.org
Nowadays, user authentication is one of the important topics in information security. Strong
text-based password schemes could provide with certain degree of security. However, the …
text-based password schemes could provide with certain degree of security. However, the …
Learning assigned secrets for unlocking mobile devices
S Schechter, J Bonneau - Eleventh Symposium On Usable Privacy and …, 2015 - usenix.org
Nearly all smartphones and tablets support unlocking with a short user-chosen secret: eg, a
numeric PIN or a pattern. To address users' tendency to choose guessable PINs and …
numeric PIN or a pattern. To address users' tendency to choose guessable PINs and …
Usability of humanly computable passwords
Reusing passwords across multiple websites is a common practice that compromises
security. Recently, Blum and Vempala have proposed password strategies to help people …
security. Recently, Blum and Vempala have proposed password strategies to help people …
BoD taps: an improved back-of-device authentication technique on smartphones
Previous work in the literature has shown that back-of-device (BoD) authentication is
significantly more secure than standard front-facing approaches. However, the only BoD …
significantly more secure than standard front-facing approaches. However, the only BoD …
The use of pseudo pressure in authenticating smartphone users
In this article, we present a new user authentication technique for touchscreen-based
smartphone users that augments pseudo touch pressure as an extra security measure to the …
smartphone users that augments pseudo touch pressure as an extra security measure to the …