Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords
We present Cued Gaze-Points (CGP) as a shoulder-surfing resistant cued-recall graphical
password scheme where users gaze instead of mouse-click. This approach has several …
password scheme where users gaze instead of mouse-click. This approach has several …
A new graphical password scheme resistant to shoulder-surfing
H Gao, Z Ren, X Chang, X Liu… - 2010 International …, 2010 - ieeexplore.ieee.org
Shoulder-surfing is a known risk where an attacker can capture a password by direct
observation or by recording the authentication session. Due to the visual interface, this …
observation or by recording the authentication session. Due to the visual interface, this …
Exploring usability effects of increasing security in click-based graphical passwords
Graphical passwords have been proposed to address known problems with traditional text
passwords. For example, memorable user-chosen text passwords are predictable, but …
passwords. For example, memorable user-chosen text passwords are predictable, but …
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based
passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can …
passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can …
Usability and strength in click-based graphical passwords
E Stobert - CHI'10 Extended Abstracts on Human Factors in …, 2010 - dl.acm.org
Click-based graphical passwords have attractive usability properties, such as cueing and
good memorability. However, parameters such as image size and number of click-points in …
good memorability. However, parameters such as image size and number of click-points in …
A robust frequency offset estimation scheme for OFDM systems
L Chun-guo, L Li-zhong… - 2010 Global Mobile …, 2010 - ieeexplore.ieee.org
In this paper, an improved carrier frequency offset estimation method which is less sensitive
to timing offset is proposed. The method is based on the carefully constructed frequency …
to timing offset is proposed. The method is based on the carefully constructed frequency …
Methods and techniques to protect against shoulder surfing and phishing attacks
PP Shi - 2010 - spectrum.library.concordia.ca
Identity theft refers to the preparatory stage of acquiring and collecting someone else's
personal information for criminal purposes. During the past few years, a very large number …
personal information for criminal purposes. During the past few years, a very large number …
[PDF][PDF] Poster: The MVP web-based framework for user studies in authentication
S Chiasson, C Deschamps, M Hlywa… - Symposium on Usable …, 2010 - academia.edu
Despite the ubiquity of password systems, knowledge-based authentication remains an
important and active research area. Many current systems have low security, and even then …
important and active research area. Many current systems have low security, and even then …
Techniques for Multistage A2 Lattice Structure Construction and Calculation Using Triangular Number (Tn) and Square Number (Sn)
I Syafalni, MFM Salleh - 2010 Second International Conference …, 2010 - ieeexplore.ieee.org
In this paper, the connection between triangular number (T n), square number (S n) for
construction and counting the A 2 lattice number in lattice vector quantization is presented …
construction and counting the A 2 lattice number in lattice vector quantization is presented …