A systematic review of emoji: Current research and future perspectives

Q Bai, Q Dan, Z Mu, M Yang - Frontiers in psychology, 2019 - frontiersin.org
A growing body of research explores emoji, which are visual symbols in computer mediated
communication (CMC). In the 20 years since the first set of emoji was released, research on …

[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research

F Mathis, J O'Hagan, M Khamis… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Given the difficulties of studying the shoulder surfing resistance of authentication systems in
a live setting, researchers often ask study participants to shoulder surf authentications by …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

Emoji Speak

J Kiaer - Emoji Speak, 2023 - torrossa.com
My interest in emoji was inspired by my daughter. At the age of two or three, just as she was
about to start talking, she was already able to hold a phone, scroll and select emojis 1 to …

A systematic survey on android api usage for data-driven analytics with smartphones

H Lee, J Park, U Lee - ACM Computing Surveys, 2022 - dl.acm.org
Recent industrial and academic research has focused on data-driven analytics with
smartphones by collecting user interaction, context, and device systems data through …

Free-form gaze passwords from cameras embedded in smart glasses

E Friström, E Lius, N Ulmanen, P Hietala… - Proceedings of the 17th …, 2019 - dl.acm.org
Contemporary personal mobile devices support a variety of authentication approaches,
featuring different levels of security and usability. With cameras embedded in smart glasses …

[PDF][PDF] User experience with mobile security and privacy mechanisms

L Kraus - 2017 - depositonce.tu-berlin.de
Smartphones have become indispensable in the life of many people. They are constant
companions, connections to the world, information sources, and substitutes for other devices …

The bird is the word: a usability evaluation of emojis inside text passwords

T Seitz, F Mathis, H Hussmann - … of the 29th Australian Conference on …, 2017 - dl.acm.org
Passwords still represent an annoying burden for millions of Internet users. Helping people
create memorable and secure credentials is therefore an important goal for web-service …

Shoulder surf resistant screen locking for smartphones: a review of fifty non-biometric methods

H Aris, WF Yaakob - 2018 IEEE Conference on Application …, 2018 - ieeexplore.ieee.org
With a lot of personal information being stored in the smartphones nowadays, there is an
urgent need to protect them from unauthorised access. The first line of defense of a …