Security keys: Practical cryptographic second factors for the modern web
Abstract “Security Keys” are second-factor devices that protect users against phishing and
man-in-the-middle attacks. Users carry a single device and can self-register it with any …
man-in-the-middle attacks. Users carry a single device and can self-register it with any …
Increasing the security of gaze-based cued-recall graphical passwords using saliency masks
With computers being used ever more ubiquitously in situations where privacy is important,
secure user authentication is a central requirement. Gaze-based graphical passwords are a …
secure user authentication is a central requirement. Gaze-based graphical passwords are a …
The security & privacy acceptance framework (spaf)
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
Improving password memorability, while not inconveniencing the user
Passwords are the most frequently used authentication mechanism. However, due to
increased password numbers, there has been an increase in insecure password behaviors …
increased password numbers, there has been an increase in insecure password behaviors …
Biometric authentication using mouse gesture dynamics
B Sayed, I Traoré, I Woungang… - IEEE systems …, 2013 - ieeexplore.ieee.org
The mouse dynamics biometric is a behavioral biometric technology that extracts and
analyzes the movement characteristics of the mouse input device when a computer user …
analyzes the movement characteristics of the mouse input device when a computer user …
[HTML][HTML] Shoulder surfing experiments: A systematic literature review
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …
authentication has become bloated with novel proposals aiming to replace textual …
Exploring the design space of graphical passwords on smartphones
Smartphones have emerged as a likely application area for graphical passwords, because
they are easier to input on touchscreens than text passwords. Extensive research on …
they are easier to input on touchscreens than text passwords. Extensive research on …
Is bigger better? Comparing user-generated passwords on 3x3 vs. 4x4 grid sizes for android's pattern unlock
Android's graphical authentication mechanism requires users to unlock their devices by"
drawing" a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior …
drawing" a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior …
[HTML][HTML] How memory anxiety can influence password security behavior
Password reuse and modification are insecure password behaviors that are becoming
increasingly prevalent as users are obliged to remember more passwords to access various …
increasingly prevalent as users are obliged to remember more passwords to access various …
Security notions and advanced method for human shoulder-surfing resistant PIN-entry
MK Lee - IEEE transactions on information forensics and …, 2014 - ieeexplore.ieee.org
The personal identification number (PIN) is a well-known authentication method used in
various devices, such as ATMs, mobile devices, and electronic door locks. Unfortunately, the …
various devices, such as ATMs, mobile devices, and electronic door locks. Unfortunately, the …