System for and method of providing secure sign-in on a touch screen device
M Foster, B Parker - US Patent App. 12/792,251, 2011 - Google Patents
A system for and method of providing secure sign-in on a touch screen device that
comprises an electronic device in accordance with exemplary embodiments may include …
comprises an electronic device in accordance with exemplary embodiments may include …
Secure pattern-key based password authentication scheme
Text-based password authentication scheme is vulnerable to many attacks such as shoulder
surfing attack and similar kind of attacks like dictionary attack, brute-force attack etc. Many …
surfing attack and similar kind of attacks like dictionary attack, brute-force attack etc. Many …
Authentication systems for securing clinical documentation workflows
J Schwartze, B Haarbrandt, D Fortmeier… - … of information in …, 2014 - thieme-connect.com
Context: Integration of electronic signatures embedded in health care processes in Germany
challenges health care service and supply facilities. The suitability of the signature level of …
challenges health care service and supply facilities. The suitability of the signature level of …
The current use of authentication technologies: an investigative review
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …
online and via various Internet-enabled digital devices. Unfortunately, these activities …
Preference-Oriented Password-Based Authentication
Cyberspace security is largely authenticated by password-based schemes. Its usage is
increasing day by day, and efficiency considerations are inevitable along with the …
increasing day by day, and efficiency considerations are inevitable along with the …
A behavioral biometric challenge and response approach to user authentication on smartphones
U Burgbacher, M Prätorius… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Behavioral biometrics derived from the fingertip movement on the touchscreen of a mobile
device is a promising new authentication technique. A user is verified by the inherent …
device is a promising new authentication technique. A user is verified by the inherent …
A survey of collection methods and cross-data set comparison of Android Unlock patterns
Android's graphical password unlock remains one of the most widely used schemes for
phone unlock authentication, and it is has been studied extensively in the last decade since …
phone unlock authentication, and it is has been studied extensively in the last decade since …
Measurement of viewing distances and angles for eye tracking under different lighting conditions
YT Paulus, C Hiramatsu, YKH Syn… - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Eye tracking can be used for eye-gaze-based authentication in public settings, such as for
registration on personal computers and automated teller machines. In this study, we …
registration on personal computers and automated teller machines. In this study, we …
[PDF][PDF] Analyzing the impact of collection methods and demographics for android's pattern unlock
AJ Aviv, J Maguire, JL Prak - Proc. Workshop on Usable …, 2016 - ndss-symposium.org
Building upon previous work on measuring the strength of graphical passwords we report on
further analysis of statistical differences between Android's graphical passwords collected in …
further analysis of statistical differences between Android's graphical passwords collected in …