Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
User authentication on mobile devices: Approaches, threats and trends
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …
to enjoy the anytime and anywhere various applications such as the online shopping …
Touch me once and i know it's you! implicit authentication based on touch screen patterns
Password patterns, as used on current Android phones, and other shape-based
authentication schemes are highly usable and memorable. In terms of security, they are …
authentication schemes are highly usable and memorable. In terms of security, they are …
You are how you touch: User verification on smartphones via tapping behaviors
Smartphone users have their own unique behavioral patterns when tapping on the touch
screens. These personal patterns are reflected on the different rhythm, strength, and angle …
screens. These personal patterns are reflected on the different rhythm, strength, and angle …
Biometric-rich gestures: a novel approach to authentication on multi-touch devices
In this paper, we present a novel multi-touch gesture-based authentication technique. We
take advantage of the multi-touch surface to combine biometric techniques with gestural …
take advantage of the multi-touch surface to combine biometric techniques with gestural …
Password entry usability and shoulder surfing susceptibility on different smartphone platforms
Virtual keyboards of different smartphone platforms seem quite similar at first glance, but the
transformation from a physical to a virtual keyboard on a small-scale display results in user …
transformation from a physical to a virtual keyboard on a small-scale display results in user …
Interaction with large displays: A survey
Large interactive displays are increasingly placed in public (or semipublic) locations,
including museums, shops, various city settings, and offices. This article discusses the …
including museums, shops, various city settings, and offices. This article discusses the …
Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices
Graphical password systems based upon the recall and reproduction of visual patterns (eg
as seen on the Google Android platform) are assumed to have desirable usability and …
as seen on the Google Android platform) are assumed to have desirable usability and …
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Nowadays, touchscreen mobile phones make up a larger and larger share in the mobile
market. Users also often use their mobile phones (eg, Android phones) to store personal …
market. Users also often use their mobile phones (eg, Android phones) to store personal …