This pin can be easily guessed: Analyzing the security of smartphone unlock pins
We provide the first comprehensive study of user-chosen 4-and 6-digit PINs (n= 1220)
collected on smartphones with participants being explicitly primed for device unlocking. We …
collected on smartphones with participants being explicitly primed for device unlocking. We …
On the security of smartphone unlock pins
In this article, we provide the first comprehensive study of user-chosen four-and six-digit
PINs (n= 1705) collected on smartphones with participants being explicitly primed for device …
PINs (n= 1705) collected on smartphones with participants being explicitly primed for device …
Bu-Dash: a universal and dynamic graphical password scheme (extended version)
P Andriotis, M Kirby, A Takasu - International Journal of Information …, 2023 - Springer
Passwordless authentication is a trending theme in cyber security, while biometrics
gradually replace knowledge-based schemes. However, Personal Identification Numbers …
gradually replace knowledge-based schemes. However, Personal Identification Numbers …
Using a blocklist to improve the security of user selection of android patterns
Android patterns remain a popular method for unlocking smartphones, despite evidence
suggesting that many users choose easily guessable patterns. In this paper, we explore the …
suggesting that many users choose easily guessable patterns. In this paper, we explore the …
Double patterns: a usable solution to increase the security of android unlock patterns
Android unlock patterns are still commonly used, and roughly 25% of the respondents to our
study use a pattern when unlocking their phone. Despite security issues, the design of the …
study use a pattern when unlocking their phone. Despite security issues, the design of the …
User Perceptions of Five-Word Passwords
X Wu, CW Munyendo, E Cosic, GA Flynn… - Proceedings of the 38th …, 2022 - dl.acm.org
Human-chosen passwords are often short, selected non-uniformly, and thus, susceptible to
automated guessing attacks. To help users to select more secure but memorable …
automated guessing attacks. To help users to select more secure but memorable …
RePaLM: A Data-Driven AI Assistant for Making Stronger Pattern Choices
Security mechanisms based on patterns, such as Pattern Lock, are commonly used to
prevent unauthorized access. They introduce several benefits, such as ease of use, an …
prevent unauthorized access. They introduce several benefits, such as ease of use, an …
[PDF][PDF] Usability and security of risk-based authentication
P Markert - 2023 - philipp-markert.com
Usability and Security of Risk-based Authentication Page 1 Usability and Security of Risk-based
Authentication Philipp Markert Thesis Defense • July 28, 2023 • Bochum Page 2 Thesis Defense …
Authentication Philipp Markert Thesis Defense • July 28, 2023 • Bochum Page 2 Thesis Defense …
Securing knowledge-based authentication against online attackers
DV Bailey - 2023 - hss-opus.ub.ruhr-unibochum.de
Wissensbasierte Authentifizierungsmethoden (Englisch: knowledge-based authenticators,
KBAs), wie Passwörter und Persönliche Identifikationsnummern (PINs), werden oft aus einer …
KBAs), wie Passwörter und Persönliche Identifikationsnummern (PINs), werden oft aus einer …
[PDF][PDF] Bu-Dash
P Andriotis, M Kirby, A Takasu - 2022 - pure-oai.bham.ac.uk
Passwordless authentication is a trending theme in cyber security, while biometrics
gradually replace knowledge-based schemes. However, Personal Identification Numbers …
gradually replace knowledge-based schemes. However, Personal Identification Numbers …