Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Consumer Electronics"
DOI: 10.1109/tce.2018.2843283
Abstract: Authentication of personal computing device is prone to shoulder-surfing attacks. Gesture-based techniques are often used for such authentication. However, existing techniques fall prey to identity theft. The main reason is the visual trails that are…
read more here.
Keywords:
shoulder surfing;
motion sensor;
robustness analysis;
authentication ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "Proceedings of the ACM on Human-Computer Interaction"
DOI: 10.1145/3546742
Abstract: This paper contributes to our understanding of user-centered attacks on smartphones. In particular, we investigate the likelihood of so-called shoulder surfing attacks during touch-based unlock events and provide insights into users' views and perceptions. To…
read more here.
Keywords:
shoulder surfing;
shoulder;
attacks touch;
touch based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "F1000Research"
DOI: 10.12688/f1000research.73691.1
Abstract: Background: Emojis are icons that are familiar and fun to add pizzazz and colour to communication. They have also been used in authentication where the emojis form memorable pictogram story-like passwords. Emojis, which are graphical,…
read more here.
Keywords:
authentication;
shoulder surfing;
surfing resistant;
memorability ... See more keywords