Articles with "shoulder surfing" as a keyword



Photo from wikipedia

Robustness Analysis of Motion Sensor Guided Air Authentication System

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2018.2843283

Abstract: Authentication of personal computing device is prone to shoulder-surfing attacks. Gesture-based techniques are often used for such authentication. However, existing techniques fall prey to identity theft. The main reason is the visual trails that are… read more here.

Keywords: shoulder surfing; motion sensor; robustness analysis; authentication ... See more keywords
Photo by jeremybishop from unsplash

An Investigation of Shoulder Surfing Attacks on Touch-Based Unlock Events

Sign Up to like & get
recommendations!
Published in 2022 at "Proceedings of the ACM on Human-Computer Interaction"

DOI: 10.1145/3546742

Abstract: This paper contributes to our understanding of user-centered attacks on smartphones. In particular, we investigate the likelihood of so-called shoulder surfing attacks during touch-based unlock events and provide insights into users' views and perceptions. To… read more here.

Keywords: shoulder surfing; shoulder; attacks touch; touch based ... See more keywords
Photo by jeremybishop from unsplash

Improving memorability using Emojis in a shoulder surfing resistant authentication method

Sign Up to like & get
recommendations!
Published in 2022 at "F1000Research"

DOI: 10.12688/f1000research.73691.1

Abstract: Background: Emojis are icons that are familiar and fun to add pizzazz and colour to communication. They have also been used in authentication where the emojis form memorable pictogram story-like passwords. Emojis, which are graphical,… read more here.

Keywords: authentication; shoulder surfing; surfing resistant; memorability ... See more keywords