Eyedi: Graphical authentication scheme of estimating your encodable distorted images to prevent screenshot attacks

T Kawamura, T Ebihara, N Wakatsuki, K Zempo - IEEE Access, 2021 - ieeexplore.ieee.org
Graphical authentication schemes have the advantage of being more memorable than
conventional passwords. Although some image distortion methods have been proposed to …

Bag of on-phone ANNs to secure IoT objects using wearable and smartphone biometrics

S Vhaduri, W Cheung, SV Dibbo - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The introduction of the Internet of Things (IoT) has made several emerging applications, from
financial transactions to property access, possible through IoT-connected smart wearables …

Exploring a Secure Device Pairing Using Human Body as a Conductor

Y Wang, T Gu, Y Zhang, M Lyu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent research has been exploring ways to streamline device pairing by introducing touch-
to-access that minimizes user interaction. It generates pairing keys by extracting features …

GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication

M Khamis, M Hassib, E Zezschwitz, A Bulling… - Proceedings of the 19th …, 2017 - dl.acm.org
Although mobile devices provide access to a plethora of sensitive data, most users still only
protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …

[HTML][HTML] Securing access to internet of medical things using a graphical-password-based user authentication scheme

MA Khan, IU Din, A Almogren - Sustainability, 2023 - mdpi.com
Digital healthcare services have seen significant growth in this decade and many new
technologies have been thoroughly examined to provide efficient services through secure …

Back-of-device authentication on smartphones

A De Luca, E Von Zezschwitz, NDH Nguyen… - Proceedings of the …, 2013 - dl.acm.org
This paper presents BoD Shapes, a novel authentication method for smartphones that uses
the back of the device for input. We argue that this increases the resistance to shoulder …

Toward self-authenticable wearable devices

FP Diez, DS Touceda, JMS Camara… - IEEE Wireless …, 2015 - ieeexplore.ieee.org
Wearable devices communicate among themselves, but they also need to communicate with
remote entities through the Internet in order to share information. Given the sensitivity of the …

Looks good to me: Authentication for augmented reality

E Gaebel, N Zhang, W Lou, YT Hou - Proceedings of the 6th …, 2016 - dl.acm.org
Augmented reality is poised to become a dominant computing paradigm over the next
decade. With promises of three-dimensional graphics and interactive interfaces, augmented …

AlignPIN: Indirect PIN selection for protection against repeated shoulder surfing

S Jain, S Dabola, S Binjola… - 2021 11th International …, 2021 - ieeexplore.ieee.org
Authentication schemes need to be designed such that they can provide security against
observational attacks. Many modern day services use Personal Identification Numbers …

Graphical authentication schemes: balancing amount of image distortion

LN Tiller, AA Cain, LN Potter, JD Still - … Factors in Cybersecurity, July 21-25 …, 2019 - Springer
Graphical authentication schemes offer a more memorable alternative to conventional
passwords. One common criticism of graphical passcodes is the risk for observability by …