Swipin: Fast and secure pin-entry on smartphones

E Von Zezschwitz, A De Luca, B Brunkow… - Proceedings of the 33rd …, 2015 - dl.acm.org
In this paper, we present SwiPIN, a novel authentication system that allows input of
traditional PINs using simple touch gestures like up or down and makes it secure against …

Two-thumbs-up: Physical protection for pin entry secure against recording attacks

DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee… - computers & …, 2018 - Elsevier
We present a new Personal Identification Number (PIN) entry method for smartphones that
can be used in security-critical applications, such as smartphone banking. The proposed …

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers

A De Luca, M Harbach, E von Zezschwitz… - Proceedings of the …, 2014 - dl.acm.org
In this paper, we present XSide, an authentication mechanism that uses the front and the
back of smartphones to enter stroke-based passwords. Users can switch sides during input …

Evaluating attack and defense strategies for smartphone pin shoulder surfing

H Khan, U Hengartner, D Vogel - … of the 2018 CHI Conference on Human …, 2018 - dl.acm.org
We evaluate the efficacy of shoulder surfing defenses for PIN-based authentication systems.
We find tilting the device away from the observer, a widely adopted defense strategy …

DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices

T Van Nguyen, N Sae-Bae, N Memon - computers & security, 2017 - Elsevier
This paper presents D raw-A-PIN, a user authentication system on a device with a touch
interface that supports the use of PINs. In the proposed system, the user is asked to draw her …

Secure pin-entry method using one-time pin (OTP)

F Binbeshr, LY Por, MLM Kiah, AA Zaidan… - IEEE Access, 2023 - ieeexplore.ieee.org
The regular PIN-entry method has been still the most common method of authentication for
systems and networks. However, PINs are easy to be captured through various attacks …

Colorsnakes: Using colored decoys to secure authentication in sensitive contexts

J Gugenheimer, A De Luca, H Hess, S Karg… - Proceedings of the 17th …, 2015 - dl.acm.org
In this paper we present ColorSnakes, a PIN-based authentication mechanism for
smartphones which uses fake paths on a grid of numbers to disguise user input. In a lab …

Securing PIN‐based authentication in smartwatches with just two gestures

M Guerar, M Migliardi, F Palmieri… - Concurrency and …, 2020 - Wiley Online Library
Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to
develop sophisticated applications that make daily life easier and more convenient for …

Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it

M Shahzad, AX Liu, A Samuel - Proceedings of the 19th annual …, 2013 - dl.acm.org
With the rich functionalities and enhanced computing capabilities available on mobile
computing devices with touch screens, users not only store sensitive information (such as …

Security notions and advanced method for human shoulder-surfing resistant PIN-entry

MK Lee - IEEE transactions on information forensics and …, 2014 - ieeexplore.ieee.org
The personal identification number (PIN) is a well-known authentication method used in
various devices, such as ATMs, mobile devices, and electronic door locks. Unfortunately, the …