On the use of emojis in mobile authentication

L Kraus, R Schmidt, M Walch, F Schaub… - ICT Systems Security and …, 2017 - Springer
Mobile authentication methods protect smartphones from unauthorized access, but also
require users to remember and frequently enter PINs, passwords, or graphical patterns. We …

[引用][C] On the Use of Emojis in Mobile Authentication

L Kraus, R Schmidt, M Walch, F Schaub, S Moeller - 2017 - oparu.uni-ulm.de

[PDF][PDF] On the Use of Emojis in Mobile Authentication

L Kraus, R Schmidt, M Walch, F Schaub, S Möller - uni-ulm.de
Mobile authentication methods protect smartphones from unauthorized access, but also
require users to remember and frequently enter PINs, passwords, or graphical patterns 4 …

On the Use of Emojis in Mobile Authentication

L Kraus, R Schmidt, M Walch, F Schaub… - 32th IFIP International …, 2017 - ifip.hal.science
Mobile authentication methods protect smartphones from unauthorized access, but also
require users to remember and frequently enter PINs, passwords, or graphical patterns. We …

On the Use of Emojis in Mobile Authentication

L Kraus, R Schmidt, M Walch, F Schaub… - 32th IFIP International …, 2017 - inria.hal.science
Mobile authentication methods protect smartphones from unauthorized access, but also
require users to remember and frequently enter PINs, passwords, or graphical patterns. We …

On the Use of Emojis in Mobile Authentication

L Kraus, R Schmidt, M Walch, F Schaub… - 32th IFIP International …, 2017 - hal.science
Mobile authentication methods protect smartphones from unauthorized access, but also
require users to remember and frequently enter PINs, passwords, or graphical patterns. We …

On the Use of Emojis in Mobile Authentication

S Möller - ICT Systems Security and Privacy Protection: 32nd IFIP …, 2017 - books.google.com
Mobile authentication methods protect smartphones from unauthorized access, but also
require users to remember and frequently enter PINs, passwords, or graphical patterns. We …