G Dhandapani, J Ferguson, E Freeman - Proceedings of the 2021 …, 2021 - dl.acm.org
Smartphones provide access to increasing amounts of personal and sensitive information, yet are often only secured using methods that are prone to observational attacks. We …
MV Kamarushi, SL Watson, GW Tigwell… - Proceedings of the ACM …, 2022 - dl.acm.org
A Personal Identification Number (PIN) is a widely adopted authentication method used by smartphones, ATMs, etc. PINs offer strong security and can be reset when compromised …
With exponential growth of using mobile devices, new authentication methods are required for better protection of personal information. The frequent use of these devices in our daily …
We address the problem of shoulder-surfing attacks on authentication schemes by proposing IllusionPIN (IPIN), a PIN-based authentication method that operates on …
In this paper, we present SwiPIN, a novel authentication system that allows input of traditional PINs using simple touch gestures like up or down and makes it secure against …
In this paper, we present XSide, an authentication mechanism that uses the front and the back of smartphones to enter stroke-based passwords. Users can switch sides during input …
K Kobayashi, T Oguni, M Nakagawa - IEICE TRANSACTIONS on …, 2020 - search.ieice.org
This paper presents a series of secure PIN/password input methods resilient to shoulder hacking. When a person inputs a PIN or password to a smartphone, tablet, banking terminal …
We present PathWord (PATH passWORD), a multimodal digit entry method for ad-hoc authentication based on known digits shape and user relative eye movements. PathWord is …