Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
User authentication on mobile devices: Approaches, threats and trends
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …
to enjoy the anytime and anywhere various applications such as the online shopping …
Biometric-rich gestures: a novel approach to authentication on multi-touch devices
In this paper, we present a novel multi-touch gesture-based authentication technique. We
take advantage of the multi-touch surface to combine biometric techniques with gestural …
take advantage of the multi-touch surface to combine biometric techniques with gestural …
Quantifying the security of graphical passwords: The case of android unlock patterns
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …
of text-based passwords, inspired by research that shows that the graphical memory of …
An efficient user verification system via mouse movements
N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …
Digital privacy challenges with shared mobile phone use in Bangladesh
Prior research on technology use in the Global South suggests that people in marginalized
communities frequently share a single device among multiple individuals. However, the data …
communities frequently share a single device among multiple individuals. However, the data …
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …
password scheme, including usability and security evaluations, and implementation …
Captcha as graphical passwords—A new security primitive based on hard AI problems
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
Influencing users towards better passwords: persuasive cued click-points
Usable security has unique usability challenges because the need for security often means
that standard human-computerinteraction approaches cannot be directly applied. An …
that standard human-computerinteraction approaches cannot be directly applied. An …
A shoulder surfing resistant graphical authentication system
Authentication based on passwords is used largely in applications for computer security and
privacy. However, human actions such as choosing bad passwords and inputting passwords …
privacy. However, human actions such as choosing bad passwords and inputting passwords …