Widely reused and shared, infrequently updated, and sometimes inherited: A holistic view of pin authentication in digital lives and beyond
Personal Identification Numbers (PINs) are widely used as an access control mechanism for
digital assets (eg, smartphones), financial assets (eg, ATM cards), and physical assets (eg …
digital assets (eg, smartphones), financial assets (eg, ATM cards), and physical assets (eg …
Understanding human-chosen pins: characteristics, distribution and security
Personal Identification Numbers (PINs) are ubiquitously used in embedded computing
systems where user input interfaces are constrained. Yet, little attention has been paid to this …
systems where user input interfaces are constrained. Yet, little attention has been paid to this …
On the Memorability of System-generated {PINs}: Can Chunking Help?
To ensure that users do not choose weak personal identication numbers (PINs), many banks
give out system-generated random PINs. 4-digit is the most commonly used PIN length, but …
give out system-generated random PINs. 4-digit is the most commonly used PIN length, but …
[PDF][PDF] A quest for inspiration: How users create and reuse PINs
M Casimiro, J Segel, L Li, Y Wang, LF Cranor - Who Are You, 2020 - wayworkshop.org
Abstract Personal Identification Numbers (PINs), required to authenticate on a multitude of
devices, are ubiquitous nowadays. To increase the security and safety of their assets, users …
devices, are ubiquitous nowadays. To increase the security and safety of their assets, users …
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication
mechanisms are developed to overcome security problems of personal identification …
mechanisms are developed to overcome security problems of personal identification …
Evaluating the usability and security of a graphical one-time PIN system
S Brostoff, P Inglesant, MA Sasse - Proceedings of HCI 2010, 2010 - scienceopen.com
Traditional Personal Identification Numbers (PINs) are widely used, but the attacks in which
they are captured have been increasing. One-time PINs offer better security, but potentially …
they are captured have been increasing. One-time PINs offer better security, but potentially …
Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices
Graphical password systems based upon the recall and reproduction of visual patterns (eg
as seen on the Google Android platform) are assumed to have desirable usability and …
as seen on the Google Android platform) are assumed to have desirable usability and …
How Helpful is Colour-Cueing of PIN Entry?
K Renaud, J Ramsay - arXiv preprint arXiv:1407.8007, 2014 - arxiv.org
21st Century citizens are faced with the need to remember numbers of PINs (Personal
Identification Numbers) in order to do their daily business, and they often have difficulties …
Identification Numbers) in order to do their daily business, and they often have difficulties …
[PDF][PDF] SOPHISTICATED AUTHENTICATION USING INDIRECT PIN ENTRY
M Vishnu, V Vigneshwaran, S Krishna, MR Kohila - ijprems.com
In the realm of secure PIN entry methods, traditional direct input mechanisms have been
prevalent but prone to vulnerabilities such as shoulder surfing and brute force attacks. To …
prevalent but prone to vulnerabilities such as shoulder surfing and brute force attacks. To …