Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

EchoHand: High accuracy and presentation attack resistant hand authentication on commodity mobile devices

C Wu, J Chen, K He, Z Zhao, R Du… - Proceedings of the 2022 …, 2022 - dl.acm.org
Biometric authentication schemes, ie, fingerprint and face authentication, raise serious
privacy concerns. To alleviate such concerns, hand authentication has been proposed …

fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars

D Wang, D He, H Cheng, P Wang - 2016 46th Annual IEEE …, 2016 - ieeexplore.ieee.org
To provide timely feedbacks to users, nearly every respectable Internet service now imposes
a password strength meter (PSM) upon user registration or password change. It is a rare bit …

Emerging NUI-based methods for user authentication: A new taxonomy and survey

N Sae-Bae, J Wu, N Memon, J Konrad… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the convenience and cost benefits of natural user interface (NUI) technologies are
hastening their wide adoption, computing devices equipped with such interfaces are …

Better, funner, stronger: a gameful approach to nudge people into making less predictable graphical password choices

GE Raptis, C Katsini, AJL Cen… - Proceedings of the …, 2021 - dl.acm.org
Graphical user authentication (GUA) is a common alternative to text-based user
authentication, where people are required to draw graphical passwords on background …

Influences of human cognition and visual behavior on password strength during picture password composition

C Katsini, C Fidas, GE Raptis, M Belk… - Proceedings of the …, 2018 - dl.acm.org
Visual attention, search, processing and comprehension are important cognitive tasks
during a graphical password composition activity. Aiming to shed light on whether individual …

Optiwords: A new password policy for creating memorable and strong passwords

Y Guo, Z Zhang, Y Guo - Computers & Security, 2019 - Elsevier
User-generated textual passwords suffer from the conflict between security and usability.
System administrators usually adopt password composition policies to help users choose …

[PDF][PDF] Surveying biometric authentication for mobile device security

TJ Neal, DL Woodard - Journal of Pattern Recognition Research, 2016 - cse.usf.edu
Mobile devices, such as smartphones and tablets, are frequently used for creation and
transmission of private and sensitive messages and files. While personal identification …