In search of the silver bullet to solve the password problem, the field of knowledge-based authentication has become bloated with novel proposals aiming to replace textual …
Given the difficulties of studying the shoulder surfing resistance of authentication systems in a live setting, researchers often ask study participants to shoulder surf authentications by …
R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods proposed and analyzed. In related areas, such as secure channel …
My interest in emoji was inspired by my daughter. At the age of two or three, just as she was about to start talking, she was already able to hold a phone, scroll and select emojis 1 to …
H Lee, J Park, U Lee - ACM Computing Surveys, 2022 - dl.acm.org
Recent industrial and academic research has focused on data-driven analytics with smartphones by collecting user interaction, context, and device systems data through …
E Friström, E Lius, N Ulmanen, P Hietala… - Proceedings of the 17th …, 2019 - dl.acm.org
Contemporary personal mobile devices support a variety of authentication approaches, featuring different levels of security and usability. With cameras embedded in smart glasses …
Smartphones have become indispensable in the life of many people. They are constant companions, connections to the world, information sources, and substitutes for other devices …
Passwords still represent an annoying burden for millions of Internet users. Helping people create memorable and secure credentials is therefore an important goal for web-service …
H Aris, WF Yaakob - 2018 IEEE Conference on Application …, 2018 - ieeexplore.ieee.org
With a lot of personal information being stored in the smartphones nowadays, there is an urgent need to protect them from unauthorised access. The first line of defense of a …