Articles with "pin entry" as a keyword



Photo from wikipedia

On Overcoming the Identified Limitations of a Usable PIN Entry Method

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2937948

Abstract: In the domain of password security, research has made significant progress in handling different kinds of threats which require human intelligence factor to fix the vulnerabilities. In spite of having strong theoretical establishments, most of… read more here.

Keywords: identified limitations; method; pin entry; overcoming identified ... See more keywords
Photo from wikipedia

Secure PIN-Entry Method Using One-Time PIN (OTP)

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3243114

Abstract: The regular PIN-entry method has been still the most common method of authentication for systems and networks. However, PINs are easy to be captured through various attacks, including shoulder-surfing, video-recording, and spyware. This could be… read more here.

Keywords: pin entry; entry method; one time; pin ... See more keywords