Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …

Biometric-rich gestures: a novel approach to authentication on multi-touch devices

N Sae-Bae, K Ahmed, K Isbister, N Memon - proceedings of the SIGCHI …, 2012 - dl.acm.org
In this paper, we present a novel multi-touch gesture-based authentication technique. We
take advantage of the multi-touch surface to combine biometric techniques with gestural …

Quantifying the security of graphical passwords: The case of android unlock patterns

S Uellenbeck, M Dürmuth, C Wolf, T Holz - Proceedings of the 2013 …, 2013 - dl.acm.org
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …

An efficient user verification system via mouse movements

N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …

Digital privacy challenges with shared mobile phone use in Bangladesh

SI Ahmed, MR Haque, J Chen, N Dell - … of the ACM on Human-computer …, 2017 - dl.acm.org
Prior research on technology use in the Global South suggests that people in marginalized
communities frequently share a single device among multiple individuals. However, the data …

Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism

S Chiasson, E Stobert, A Forget… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …

Captcha as graphical passwords—A new security primitive based on hard AI problems

BB Zhu, J Yan, G Bao, M Yang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …

Influencing users towards better passwords: persuasive cued click-points

S Chiasson, A Forget, R Biddle… - … and Computers XXII …, 2008 - scienceopen.com
Usable security has unique usability challenges because the need for security often means
that standard human-computerinteraction approaches cannot be directly applied. An …

A shoulder surfing resistant graphical authentication system

HM Sun, ST Chen, JH Yeh… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Authentication based on passwords is used largely in applications for computer security and
privacy. However, human actions such as choosing bad passwords and inputting passwords …