Back-of-device authentication on smartphones
A De Luca, E Von Zezschwitz, NDH Nguyen… - Proceedings of the …, 2013 - dl.acm.org
This paper presents BoD Shapes, a novel authentication method for smartphones that uses
the back of the device for input. We argue that this increases the resistance to shoulder …
the back of the device for input. We argue that this increases the resistance to shoulder …
Stay cool! understanding thermal attacks on mobile-based user authentication
PINs and patterns remain among the most widely used knowledge-based authentication
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …
Gazetouchpass: Multimodal authentication using gaze and touch on mobile devices
We propose a multimodal scheme, GazeTouchPass, that combines gaze and touch for
shoulder-surfing resistant user authentication on mobile devices. GazeTouchPass allows …
shoulder-surfing resistant user authentication on mobile devices. GazeTouchPass allows …
Security notions and advanced method for human shoulder-surfing resistant PIN-entry
MK Lee - IEEE transactions on information forensics and …, 2014 - ieeexplore.ieee.org
The personal identification number (PIN) is a well-known authentication method used in
various devices, such as ATMs, mobile devices, and electronic door locks. Unfortunately, the …
various devices, such as ATMs, mobile devices, and electronic door locks. Unfortunately, the …
Prototyping usable privacy and security systems: Insights from experts
Iterative design, implementation, and evaluation of prototype systems is a common
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research
Given the difficulties of studying the shoulder surfing resistance of authentication systems in
a live setting, researchers often ask study participants to shoulder surf authentications by …
a live setting, researchers often ask study participants to shoulder surf authentications by …
OneButtonPIN: A single button authentication method for blind or low vision users to improve accessibility and prevent eavesdropping
A Personal Identification Number (PIN) is a widely adopted authentication method used by
smartphones, ATMs, etc. PINs offer strong security and can be reset when compromised …
smartphones, ATMs, etc. PINs offer strong security and can be reset when compromised …
Cuevr: Studying the usability of cue-based authentication for virtual reality
Existing virtual reality (VR) authentication schemes are either slow or prone to observation
attacks. We propose CueVR, a cue-based authentication scheme that is resilient against …
attacks. We propose CueVR, a cue-based authentication scheme that is resilient against …
Use the force: Evaluating {Force-Sensitive} authentication for mobile devices
Modern, off-the-shelf smartphones provide a rich set of possible touchscreen interactions,
but knowledge-based authentication schemes still rely on simple digit or character input …
but knowledge-based authentication schemes still rely on simple digit or character input …
Counting clicks and beeps: Exploring numerosity based haptic and audio PIN entry
Haptic and audio cues now appear commonly in computer interfaces, partially due to
inherent advantages such as their support for eyes-free interaction. Their invisible …
inherent advantages such as their support for eyes-free interaction. Their invisible …