System for and method of providing secure sign-in on a touch screen device

M Foster, B Parker - US Patent App. 12/792,251, 2011 - Google Patents
A system for and method of providing secure sign-in on a touch screen device that
comprises an electronic device in accordance with exemplary embodiments may include …

Secure pattern-key based password authentication scheme

MH Zaki, A Husain, MS Umar… - … on Multimedia, Signal …, 2017 - ieeexplore.ieee.org
Text-based password authentication scheme is vulnerable to many attacks such as shoulder
surfing attack and similar kind of attacks like dictionary attack, brute-force attack etc. Many …

Authentication systems for securing clinical documentation workflows

J Schwartze, B Haarbrandt, D Fortmeier… - … of information in …, 2014 - thieme-connect.com
Context: Integration of electronic signatures embedded in health care processes in Germany
challenges health care service and supply facilities. The suitability of the signature level of …

The current use of authentication technologies: an investigative review

A Al Abdulwahid, N Clarke, S Furnell… - … on Cloud Computing …, 2015 - ieeexplore.ieee.org
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …

Preference-Oriented Password-Based Authentication

A Kaur, K Mustafa - … Technology for Competitive Strategies (ICTCS 2020) …, 2022 - Springer
Cyberspace security is largely authenticated by password-based schemes. Its usage is
increasing day by day, and efficiency considerations are inevitable along with the …

A behavioral biometric challenge and response approach to user authentication on smartphones

U Burgbacher, M Prätorius… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Behavioral biometrics derived from the fingertip movement on the touchscreen of a mobile
device is a promising new authentication technique. A user is verified by the inherent …

[引用][C] 基于加速度传感器与小波变换的手机端手势特征身份认证方法

高焕芝, 刘志丹, 郭云镝, 邹北骥, 陈再良 - 中南大学学报: 自然科学版, 2014

A survey of collection methods and cross-data set comparison of Android Unlock patterns

AJ Aviv, M Dürmuth - arXiv preprint arXiv:1811.10548, 2018 - arxiv.org
Android's graphical password unlock remains one of the most widely used schemes for
phone unlock authentication, and it is has been studied extensively in the last decade since …

Measurement of viewing distances and angles for eye tracking under different lighting conditions

YT Paulus, C Hiramatsu, YKH Syn… - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Eye tracking can be used for eye-gaze-based authentication in public settings, such as for
registration on personal computers and automated teller machines. In this study, we …

[PDF][PDF] Analyzing the impact of collection methods and demographics for android's pattern unlock

AJ Aviv, J Maguire, JL Prak - Proc. Workshop on Usable …, 2016 - ndss-symposium.org
Building upon previous work on measuring the strength of graphical passwords we report on
further analysis of statistical differences between Android's graphical passwords collected in …