Articles with "entry method" as a keyword



Photo from wikipedia

On Overcoming the Identified Limitations of a Usable PIN Entry Method

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2937948

Abstract: In the domain of password security, research has made significant progress in handling different kinds of threats which require human intelligence factor to fix the vulnerabilities. In spite of having strong theoretical establishments, most of… read more here.

Keywords: identified limitations; method; pin entry; overcoming identified ... See more keywords
Photo from wikipedia

Secure PIN-Entry Method Using One-Time PIN (OTP)

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3243114

Abstract: The regular PIN-entry method has been still the most common method of authentication for systems and networks. However, PINs are easy to be captured through various attacks, including shoulder-surfing, video-recording, and spyware. This could be… read more here.

Keywords: pin entry; entry method; one time; pin ... See more keywords
Photo by vkark from unsplash

A One-Page Text Entry Method Optimized for Rectangle Smartwatches

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2021.3057226

Abstract: In this paper, we provide the design and implementation of UOIT, a text entry method optimized for smartwatches. UOIT uses only one page where a user can see and tap directly for entry without any… read more here.

Keywords: one page; entry; entry method; text entry ... See more keywords