Touch me once and i know it's you! implicit authentication based on touch screen patterns

A De Luca, A Hang, F Brudy, C Lindner… - proceedings of the …, 2012 - dl.acm.org
Password patterns, as used on current Android phones, and other shape-based
authentication schemes are highly usable and memorable. In terms of security, they are …

Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices

E Von Zezschwitz, P Dunphy, A De Luca - Proceedings of the 15th …, 2013 - dl.acm.org
Graphical password systems based upon the recall and reproduction of visual patterns (eg
as seen on the Google Android platform) are assumed to have desirable usability and …

Quantifying the security of graphical passwords: The case of android unlock patterns

S Uellenbeck, M Dürmuth, C Wolf, T Holz - Proceedings of the 2013 …, 2013 - dl.acm.org
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …

Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method

P Andriotis, T Tryfonas, G Oikonomou - … , HAS 2014, Held as Part of HCI …, 2014 - Springer
One of the most popular contemporary graphical password approaches is the Pattern-Lock
authentication mechanism that comes integrated with the Android mobile operating system …

Keystroke dynamics on android platform

M Antal, LZ Szabó, I László - Procedia Technology, 2015 - Elsevier
Currently people store more and more sensitive data on their mobile devices. Therefore it is
highly important to strengthen the existing authentication mechanisms. The analysis of …

PassShapes: utilizing stroke based authentication to increase password memorability

R Weiss, A De Luca - Proceedings of the 5th Nordic conference on …, 2008 - dl.acm.org
Authentication today mostly relies on passwords or personal identification numbers (PINs).
Therefore the average user has to remember an increasing amount of PINs and passwords …

Is bigger better? Comparing user-generated passwords on 3x3 vs. 4x4 grid sizes for android's pattern unlock

AJ Aviv, D Budzitowski, R Kuber - … of the 31st Annual Computer Security …, 2015 - dl.acm.org
Android's graphical authentication mechanism requires users to unlock their devices by"
drawing" a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior …

Smudgesafe: Geometric image transformations for smudge-resistant user authentication

S Schneegass, F Steimle, A Bulling, F Alt… - Proceedings of the 2014 …, 2014 - dl.acm.org
Touch-enabled user interfaces have become ubiquitous, such as on ATMs or portable
devices. At the same time, authentication using touch input is problematic, since finger …

Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it

M Shahzad, AX Liu, A Samuel - Proceedings of the 19th annual …, 2013 - dl.acm.org
With the rich functionalities and enhanced computing capabilities available on mobile
computing devices with touch screens, users not only store sensitive information (such as …

Making graphic-based authentication secure against smudge attacks

E Von Zezschwitz, A Koslow, A De Luca… - Proceedings of the …, 2013 - dl.acm.org
Most of today's smartphones and tablet computers feature touchscreens as the main way of
interaction. By using these touchscreens, oily residues of the users' fingers, smudge, remain …