PIN selection policies: Are they really effective?

H Kim, JH Huh - computers & security, 2012 - Elsevier
Users have conflicting sets of requirements when it comes to choosing Personal
Identification Numbers (PINs) for mobile phones or other systems that use PINs for …

Widely reused and shared, infrequently updated, and sometimes inherited: A holistic view of pin authentication in digital lives and beyond

H Khan, J Ceci, J Stegman, AJ Aviv, R Dara… - Proceedings of the 36th …, 2020 - dl.acm.org
Personal Identification Numbers (PINs) are widely used as an access control mechanism for
digital assets (eg, smartphones), financial assets (eg, ATM cards), and physical assets (eg …

Understanding human-chosen pins: characteristics, distribution and security

D Wang, Q Gu, X Huang, P Wang - Proceedings of the 2017 ACM on …, 2017 - dl.acm.org
Personal Identification Numbers (PINs) are ubiquitously used in embedded computing
systems where user input interfaces are constrained. Yet, little attention has been paid to this …

On the Memorability of System-generated {PINs}: Can Chunking Help?

JH Huh, H Kim, RB Bobba, MN Bashir… - eleventh symposium on …, 2015 - usenix.org
To ensure that users do not choose weak personal identication numbers (PINs), many banks
give out system-generated random PINs. 4-digit is the most commonly used PIN length, but …

[PDF][PDF] A quest for inspiration: How users create and reuse PINs

M Casimiro, J Segel, L Li, Y Wang, LF Cranor - Who Are You, 2020 - wayworkshop.org
Abstract Personal Identification Numbers (PINs), required to authenticate on a multitude of
devices, are ubiquitous nowadays. To increase the security and safety of their assets, users …

Towards understanding ATM security: a field study of real world ATM use

A De Luca, M Langheinrich, H Hussmann - Proceedings of the sixth …, 2010 - dl.acm.org
With the increase of automated teller machine (ATM) frauds, new authentication
mechanisms are developed to overcome security problems of personal identification …

Evaluating the usability and security of a graphical one-time PIN system

S Brostoff, P Inglesant, MA Sasse - Proceedings of HCI 2010, 2010 - scienceopen.com
Traditional Personal Identification Numbers (PINs) are widely used, but the attacks in which
they are captured have been increasing. One-time PINs offer better security, but potentially …

Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices

E Von Zezschwitz, P Dunphy, A De Luca - Proceedings of the 15th …, 2013 - dl.acm.org
Graphical password systems based upon the recall and reproduction of visual patterns (eg
as seen on the Google Android platform) are assumed to have desirable usability and …

How Helpful is Colour-Cueing of PIN Entry?

K Renaud, J Ramsay - arXiv preprint arXiv:1407.8007, 2014 - arxiv.org
21st Century citizens are faced with the need to remember numbers of PINs (Personal
Identification Numbers) in order to do their daily business, and they often have difficulties …

[PDF][PDF] SOPHISTICATED AUTHENTICATION USING INDIRECT PIN ENTRY

M Vishnu, V Vigneshwaran, S Krishna, MR Kohila - ijprems.com
In the realm of secure PIN entry methods, traditional direct input mechanisms have been
prevalent but prone to vulnerabilities such as shoulder surfing and brute force attacks. To …