Now you see me, now you don't: protecting smartphone authentication from shoulder surfers
In this paper, we present XSide, an authentication mechanism that uses the front and the
back of smartphones to enter stroke-based passwords. Users can switch sides during input …
back of smartphones to enter stroke-based passwords. Users can switch sides during input …
Shoulder surfing defence for recall-based graphical passwords
Graphical passwords are often considered prone to shoulder-surfing attacks, where
attackers can steal a user's password by peeking over his or her shoulder in the …
attackers can steal a user's password by peeking over his or her shoulder in the …
Shoulder surfing attack in graphical password authentication
AH Lashkari, S Farmand, DOB Zakaria… - arXiv preprint arXiv …, 2009 - arxiv.org
Information and computer security is supported largely by passwords which are the principle
part of the authentication process. The most common computer authentication method is to …
part of the authentication process. The most common computer authentication method is to …
Click passwords under investigation
K Gołofit - Computer Security–ESORICS 2007: 12th European …, 2007 - Springer
The paper explores one of the graphical authentication techniques as the possible solution
to the most important problems of traditional passwords. The aim of this work is to bring …
to the most important problems of traditional passwords. The aim of this work is to bring …
Passphrase and keystroke dynamics authentication: Usable security
B Bhana, S Flowerday - Computers & Security, 2020 - Elsevier
It was found that employees spend a total of 2.25 days within 60 days on password-related
activities. The time consumed by this is unproductive and has a negative impact on usability …
activities. The time consumed by this is unproductive and has a negative impact on usability …
Illusionpin: Shoulder-surfing resistant authentication using hybrid images
We address the problem of shoulder-surfing attacks on authentication schemes by
proposing IllusionPIN (IPIN), a PIN-based authentication method that operates on …
proposing IllusionPIN (IPIN), a PIN-based authentication method that operates on …
A graphical password based system for small mobile devices
Passwords provide security mechanism for authentication and protection services against
unwanted access to resources. A graphical based password is one promising alternatives of …
unwanted access to resources. A graphical based password is one promising alternatives of …
[HTML][HTML] Shoulder surfing: From an experimental study to a comparative framework
Shoulder surfing is an attack vector widely recognized as a real threat-enough to warrant
researchers dedicating a considerable effort toward designing novel authentication methods …
researchers dedicating a considerable effort toward designing novel authentication methods …
Validated mutual authentication
ER Potter, PM Skirvin - US Patent 7,266,693, 2007 - Google Patents
BACKGROUND Individuals use netWorks such as the Internet to conduct business,
communicate With others, make purchases, per form online banking, pay bills, obtain …
communicate With others, make purchases, per form online banking, pay bills, obtain …
Penetration Vision through Virtual Reality Headsets: Identifying 360 Videos from Head Movements
In this paper, we present the first contactless side-channel attack for identifying 360 videos
being viewed in a Virtual Reality (VR) Head Mounted Display (HMD). Although the video …
being viewed in a Virtual Reality (VR) Head Mounted Display (HMD). Although the video …