Prevention of shoulder-surfing attacks using shifting condition using digraph substitution rules

A Islam, F Othman, N Sakib, HMH Babu - arXiv preprint arXiv:2305.06549, 2023 - arxiv.org
Graphical passwords are implemented as an alternative scheme to replace alphanumeric
passwords to help users to memorize their password. However, most of the graphical …

A comparison of a touch-gesture-and a keystroke-based password method: toward shoulder-surfing resistant mobile user authentication

L Zhou, K Wang, J Lai, D Zhang - IEEE Transactions on Human …, 2023 - ieeexplore.ieee.org
The pervasive use of mobile devices exposes users to an elevated risk of shoulder-surfing
attacks. Despite the prior work on shoulder-surfing resistance of mobile user authentication …

oPass: A user authentication protocol resistant to password stealing and password reuse attacks

HM Sun, YH Chen, YH Lin - IEEE transactions on information …, 2011 - ieeexplore.ieee.org
Text password is the most popular form of user authentication on websites due to its
convenience and simplicity. However, users' passwords are prone to be stolen and …

Strengthening password-based authentication

S Ruoti, J Andersen, K Seamons - Twelfth Symposium on Usable …, 2016 - usenix.org
Even with years of research into new authentication technologies, passwords still dominate
the authentication landscape. This is due primarily to a combination of security …

UniPass: design and evaluation of a smart device-based password manager for visually impaired users

NM Barbosa, J Hayes, Y Wang - … of the 2016 ACM international joint …, 2016 - dl.acm.org
Visually impaired users face various challenges in web authentication. We designed
UniPass, an accessible password manager for visually impaired users based on a smart …

Password Security: What Are We Doing Wrong?

DK Davis, MM Chowdhury… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Passwords are used consistently in our everyday lives. Whether it's from logging in to our
smart phones, our computers, accessing our bank, etc. We need to use passwords to protect …

Biometric-rich gestures: a novel approach to authentication on multi-touch devices

N Sae-Bae, K Ahmed, K Isbister, N Memon - proceedings of the SIGCHI …, 2012 - dl.acm.org
In this paper, we present a novel multi-touch gesture-based authentication technique. We
take advantage of the multi-touch surface to combine biometric techniques with gestural …

[PDF][PDF] Authentication schemes for session passwords using color and images

M Sreelatha, M Shashi, M Anirudh, MS Ahamer… - International Journal of …, 2011 - Citeseer
Textual passwords are the most common method used for authentication. But textual
passwords are vulnerable to eves dropping, dictionary attacks, social engineering and …

Purely automated attacks on passpoints-style graphical passwords

PC Van Oorschot, A Salehi-Abari… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
We introduce and evaluate various methods for purely automated attacks against
PassPoints-style graphical passwords. For generating these attacks, we introduce a graph …

Security assessment on the mouse data using mouse loggers

H Lee, Y Lee, K Lee, K Yim - … and Applications: Proceedings of the 11th …, 2017 - Springer
The mouse device, one of the computer peripherals, is an input device that recognizes
mouse movements on the two-dimensional plane of a monitor, and it is possible to use it …