Modern authentication schemes in smartphones and IoT devices: An empirical survey
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
Zipf's law in passwords
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …
is the underlying distribution of user-generated passwords. In this paper, we make a …
Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …
storage and computational capabilities to desktop computers allowing users to store and …
EchoHand: High accuracy and presentation attack resistant hand authentication on commodity mobile devices
Biometric authentication schemes, ie, fingerprint and face authentication, raise serious
privacy concerns. To alleviate such concerns, hand authentication has been proposed …
privacy concerns. To alleviate such concerns, hand authentication has been proposed …
fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars
To provide timely feedbacks to users, nearly every respectable Internet service now imposes
a password strength meter (PSM) upon user registration or password change. It is a rare bit …
a password strength meter (PSM) upon user registration or password change. It is a rare bit …
Emerging NUI-based methods for user authentication: A new taxonomy and survey
As the convenience and cost benefits of natural user interface (NUI) technologies are
hastening their wide adoption, computing devices equipped with such interfaces are …
hastening their wide adoption, computing devices equipped with such interfaces are …
Better, funner, stronger: a gameful approach to nudge people into making less predictable graphical password choices
Graphical user authentication (GUA) is a common alternative to text-based user
authentication, where people are required to draw graphical passwords on background …
authentication, where people are required to draw graphical passwords on background …
Influences of human cognition and visual behavior on password strength during picture password composition
Visual attention, search, processing and comprehension are important cognitive tasks
during a graphical password composition activity. Aiming to shed light on whether individual …
during a graphical password composition activity. Aiming to shed light on whether individual …
Optiwords: A new password policy for creating memorable and strong passwords
Y Guo, Z Zhang, Y Guo - Computers & Security, 2019 - Elsevier
User-generated textual passwords suffer from the conflict between security and usability.
System administrators usually adopt password composition policies to help users choose …
System administrators usually adopt password composition policies to help users choose …
[PDF][PDF] Surveying biometric authentication for mobile device security
TJ Neal, DL Woodard - Journal of Pattern Recognition Research, 2016 - cse.usf.edu
Mobile devices, such as smartphones and tablets, are frequently used for creation and
transmission of private and sensitive messages and files. While personal identification …
transmission of private and sensitive messages and files. While personal identification …