Graphical password systems based upon the recall and reproduction of visual patterns (eg as seen on the Google Android platform) are assumed to have desirable usability and …
S Uellenbeck, M Dürmuth, C Wolf, T Holz - Proceedings of the 2013 …, 2013 - dl.acm.org
Graphical passwords were proposed as an alternative to overcome the inherent limitations of text-based passwords, inspired by research that shows that the graphical memory of …
One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system …
M Antal, LZ Szabó, I László - Procedia Technology, 2015 - Elsevier
Currently people store more and more sensitive data on their mobile devices. Therefore it is highly important to strengthen the existing authentication mechanisms. The analysis of …
R Weiss, A De Luca - Proceedings of the 5th Nordic conference on …, 2008 - dl.acm.org
Authentication today mostly relies on passwords or personal identification numbers (PINs). Therefore the average user has to remember an increasing amount of PINs and passwords …
AJ Aviv, D Budzitowski, R Kuber - … of the 31st Annual Computer Security …, 2015 - dl.acm.org
Android's graphical authentication mechanism requires users to unlock their devices by" drawing" a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior …
Touch-enabled user interfaces have become ubiquitous, such as on ATMs or portable devices. At the same time, authentication using touch input is problematic, since finger …
M Shahzad, AX Liu, A Samuel - Proceedings of the 19th annual …, 2013 - dl.acm.org
With the rich functionalities and enhanced computing capabilities available on mobile computing devices with touch screens, users not only store sensitive information (such as …
Most of today's smartphones and tablet computers feature touchscreens as the main way of interaction. By using these touchscreens, oily residues of the users' fingers, smudge, remain …