Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …

Touch me once and i know it's you! implicit authentication based on touch screen patterns

A De Luca, A Hang, F Brudy, C Lindner… - proceedings of the …, 2012 - dl.acm.org
Password patterns, as used on current Android phones, and other shape-based
authentication schemes are highly usable and memorable. In terms of security, they are …

You are how you touch: User verification on smartphones via tapping behaviors

N Zheng, K Bai, H Huang… - 2014 IEEE 22nd …, 2014 - ieeexplore.ieee.org
Smartphone users have their own unique behavioral patterns when tapping on the touch
screens. These personal patterns are reflected on the different rhythm, strength, and angle …

Biometric-rich gestures: a novel approach to authentication on multi-touch devices

N Sae-Bae, K Ahmed, K Isbister, N Memon - proceedings of the SIGCHI …, 2012 - dl.acm.org
In this paper, we present a novel multi-touch gesture-based authentication technique. We
take advantage of the multi-touch surface to combine biometric techniques with gestural …

Password entry usability and shoulder surfing susceptibility on different smartphone platforms

F Schaub, R Deyhle, M Weber - … of the 11th international conference on …, 2012 - dl.acm.org
Virtual keyboards of different smartphone platforms seem quite similar at first glance, but the
transformation from a physical to a virtual keyboard on a small-scale display results in user …

Interaction with large displays: A survey

C Ardito, P Buono, MF Costabile… - ACM Computing Surveys …, 2015 - dl.acm.org
Large interactive displays are increasingly placed in public (or semipublic) locations,
including museums, shops, various city settings, and offices. This article discusses the …

Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices

E Von Zezschwitz, P Dunphy, A De Luca - Proceedings of the 15th …, 2013 - dl.acm.org
Graphical password systems based upon the recall and reproduction of visual patterns (eg
as seen on the Google Android platform) are assumed to have desirable usability and …

Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems

F Mathis, K Vaniea, M Khamis - Proceedings of the 2021 chi conference …, 2021 - dl.acm.org
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …

Touch gestures based biometric authentication scheme for touchscreen mobile phones

Y Meng, DS Wong, R Schlegel, L Kwok - Information Security and …, 2013 - Springer
Nowadays, touchscreen mobile phones make up a larger and larger share in the mobile
market. Users also often use their mobile phones (eg, Android phones) to store personal …