Two-thumbs-up: Physical protection for pin entry secure against recording attacks

DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee… - computers & …, 2018 - Elsevier
We present a new Personal Identification Number (PIN) entry method for smartphones that
can be used in security-critical applications, such as smartphone banking. The proposed …

Swipin: Fast and secure pin-entry on smartphones

E Von Zezschwitz, A De Luca, B Brunkow… - Proceedings of the 33rd …, 2015 - dl.acm.org
In this paper, we present SwiPIN, a novel authentication system that allows input of
traditional PINs using simple touch gestures like up or down and makes it secure against …

Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks

T Kwon, J Hong - Ieee transactions on information forensics and …, 2014 - ieeexplore.ieee.org
Devising a user authentication scheme based on personal identification numbers (PINs) that
is both secure and practically usable is a challenging problem. The greatest difficulty lies …

DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices

T Van Nguyen, N Sae-Bae, N Memon - computers & security, 2017 - Elsevier
This paper presents D raw-A-PIN, a user authentication system on a device with a touch
interface that supports the use of PINs. In the proposed system, the user is asked to draw her …

Secure pin-entry method using one-time pin (OTP)

F Binbeshr, LY Por, MLM Kiah, AA Zaidan… - IEEE Access, 2023 - ieeexplore.ieee.org
The regular PIN-entry method has been still the most common method of authentication for
systems and networks. However, PINs are easy to be captured through various attacks …

Spinpad: a secured pin number based user authentication scheme

S Rajarajan, R Kalita, T Gayatri… - … on Recent Trends in …, 2018 - ieeexplore.ieee.org
Securing the smart phones against user authentication attacks has been a major concern for
the banks that offer mobile banking services. While the users enter their PIN numbers to get …

Incognito: Shoulder-surfing resistant selection method

JD Still, J Bell - Journal of information security and applications, 2018 - Elsevier
Authentication methods need to, at minimum, prevent casual attackers with limited resources
from gaining access to our private information. Although, Personal Identification Numbers …

Security notions and advanced method for human shoulder-surfing resistant PIN-entry

MK Lee - IEEE transactions on information forensics and …, 2014 - ieeexplore.ieee.org
The personal identification number (PIN) is a well-known authentication method used in
various devices, such as ATMs, mobile devices, and electronic door locks. Unfortunately, the …

A graphical PIN entry system with shoulder surfing resistance

M Salman, Y Li, J Wang - 2019 IEEE 4th International …, 2019 - ieeexplore.ieee.org
Personal identification number or PIN based authentication systems are most commonly
used authentication systems. Due to maturity and simplicity, these authentication systems …

On overcoming the Identified limitations of a usable pin entry method

N Chakraborty, J Li, S Mondal, F Chen, Y Pan - IEEE Access, 2019 - ieeexplore.ieee.org
In the domain of password security, research has made significant progress in handling
different kinds of threats which require human intelligence factor to fix the vulnerabilities. In …