Shoulder surfing defence for recall-based graphical passwords
Graphical passwords are often considered prone to shoulder-surfing attacks, where
attackers can steal a user's password by peeking over his or her shoulder in the …
attackers can steal a user's password by peeking over his or her shoulder in the …
A new shoulder-surfing resistant password for mobile environments
SH Kim, JW Kim, SY Kim, HG Cho - Proceedings of the 5th International …, 2011 - dl.acm.org
In mobile devices such as smart phones, it is important to provide adequate user
authentication. Conventional text-based passwords have significant drawbacks though they …
authentication. Conventional text-based passwords have significant drawbacks though they …
Design and evaluation of a shoulder-surfing resistant graphical password scheme
S Wiedenbeck, J Waters, L Sobrado… - Proceedings of the …, 2006 - dl.acm.org
When users input their passwords in a public place, they may be at risk of attackers stealing
their password. An attacker can capture a password by direct observation or by recording …
their password. An attacker can capture a password by direct observation or by recording …
[PDF][PDF] Novel shoulder-surfing resistant haptic-based graphical password
B Malek, M Orozco, A El Saddik - Proc. EuroHaptics, 2006 - researchgate.net
Graphical password schemes are believed to be more secure and more resilient to
dictionary attacks than textual passwords, but more vulnerable to shoulder surfing attacks. In …
dictionary attacks than textual passwords, but more vulnerable to shoulder surfing attacks. In …
Graphical passwords & qualitative spatial relations
A potential drawback of graphical password schemes is that they are more vulnerable to
shoulder surfing than conventional alphanumeric text passwords. We present a variation of …
shoulder surfing than conventional alphanumeric text passwords. We present a variation of …
Shoulder surfing attack in graphical password authentication
AH Lashkari, S Farmand, DOB Zakaria… - arXiv preprint arXiv …, 2009 - arxiv.org
Information and computer security is supported largely by passwords which are the principle
part of the authentication process. The most common computer authentication method is to …
part of the authentication process. The most common computer authentication method is to …
PassBYOP: bring your own picture for securing graphical passwords
PassBYOP is a new graphical password scheme for public terminals that replaces the static
digital images typically used in graphical password systems with personalized physical …
digital images typically used in graphical password systems with personalized physical …
A shoulder surfing resistant graphical authentication system
Authentication based on passwords is used largely in applications for computer security and
privacy. However, human actions such as choosing bad passwords and inputting passwords …
privacy. However, human actions such as choosing bad passwords and inputting passwords …
EvoPass: Evolvable graphical password against shoulder-surfing attacks
The passwords for authenticating users are susceptible to shoulder-surfing attacks in which
attackers learn users' passwords through direct observations without any technical support …
attackers learn users' passwords through direct observations without any technical support …
Graphical password: prevent shoulder-surfing attack using digraph substitution rules
In this paper, a new scheme that uses digraph substitution rules to conceal the mechanism
or activity required to derive password-images is proposed. In the proposed method, a user …
or activity required to derive password-images is proposed. In the proposed method, a user …