A Deep Dive into User's Preferences and Behavior around Mobile Phone Sharing

R Paudel, P Dumaru, A Shrestha, H Kocabas… - Proceedings of the …, 2023 - dl.acm.org
Users share their personal devices with different entities in various circumstances. While
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …

Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations

A Constantinides, M Belk, C Fidas, R Beumers… - ACM Transactions on …, 2023 - dl.acm.org
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …

GPOD: an efficient and secure graphical password authentication system by fast object detection

P Ray, D Giri, W Meng, S Hore - Multimedia Tools and Applications, 2023 - Springer
Nowadays, the graphical password has gained significant recognition and has become a
subject of extensive investigation within the research community. The proliferation of Internet …

Story-based authentication for mobile devices using semantically-linked images

I Olade, HN Liang, C Fleming - International Journal of Human-Computer …, 2023 - Elsevier
We introduce SemanticLock, a simple, fast, and memorable single-factor graphical
authentication approach for mobile devices. SemanticLock uses a set of graphical images …

Pixi: Password inspiration by exploring information

S Wang, A Salehi-Abari, J Thorpe - International Conference on …, 2023 - Springer
Passwords, a first line of defense against unauthorized access, must be secure and
memorable. However, people often struggle to create secure passwords they can recall. To …

BioCase: Privacy Protection via Acoustic Sensing of Finger Touches on Smartphone Case Mini-Structures

Y Yang, X Li, Z Ye, Y Wang, Y Chen - Proceedings of the 21st Annual …, 2023 - dl.acm.org
Finger biometrics are widely used by smartphones as a secure and user-friendly credential
for privacy protection. However, this information is difficult to measure without high …

A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 25022

KC Mishra, S Dutta - International Journal of Information Security, 2023 - Springer
The disadvantages of traditional text-based user authentication methods include the inability
to remember lengthy passwords, the ease with which they can be shared, and their …

Intelligent Security System with Haptic Device and Random Number Generator on Touch Enabled Devices

S Dhanasekaran, S Boopathy… - … on Advancements in …, 2023 - ieeexplore.ieee.org
Among the most common means of communication between haptic devices and humans
nowadays is vibrating response. Important vibrational considerations must be looked into …

Touch Pointer Movement-Based PIN Entry in Smartphones to Assist Persons with Visual Impairments

G Balayogi, KS Kuppusamy - … on Emerging Trends and Technologies on …, 2023 - Springer
Usable security is an area of active research. Several factors needs to be considered while
making the security usable. As the digital platforms have evolved into the primary source of …

Acoustic-Based Hand Biometric Sensing for User Verification on Mobile Devices

Y Yang - 2023 - search.proquest.com
Acoustic frequencies, commonly approximated from 20 Hz to 20 kHz, possess great
potential for wireless sensing applications in the mobile Internet-of-Things (IoT). However …