User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …

Authentication systems: A literature review and classification

MH Barkadehi, M Nilashi, O Ibrahim, AZ Fardi… - Telematics and …, 2018 - Elsevier
One of the most important parts of any system is authentication. Appreciated as the first and
the last line of defense in the great majority of cases, authentication systems can usually …

Acoustic-based sensing and applications: A survey

Y Bai, L Lu, J Cheng, J Liu, Y Chen, J Yu - Computer Networks, 2020 - Elsevier
With advancements of wireless and sensing technologies, recent studies have
demonstrated technical feasibility and effectiveness of using acoustic signals for sensing. In …

Vla: A practical visible light-based attack on face recognition systems in physical world

M Shen, Z Liao, L Zhu, K Xu, X Du - … of the ACM on Interactive, Mobile …, 2019 - dl.acm.org
Adversarial example attacks have become a growing menace to neural network-based face
recognition systems. Generated by composing facial images with pixel-level perturbations …

SMS OTP security (SOS) hardening SMS-based two factor authentication

C Peeters, C Patton, INS Munyaka… - Proceedings of the …, 2022 - dl.acm.org
SMS-based two-factor authentication (2FA) is the most widely deployed 2FA mechanism,
despite the fact that SMS messages are known to be vulnerable to rerouting attacks, and …

Shoulder-surfing resistant authentication for augmented reality

R Düzgün, P Mayer, M Volkamer - Nordic Human-Computer Interaction …, 2022 - dl.acm.org
Augmented Reality (AR) Head-Mounted Displays (HMD) are increasingly used in industry to
digitize processes and enhance user experience by enabling real-time interaction with both …

Sok: A systematic literature review of knowledge-based authentication on augmented reality head-mounted displays

R Düzgün, N Noah, P Mayer, S Das… - Proceedings of the 17th …, 2022 - dl.acm.org
The adoption of Augmented Reality (AR) technology has increased over the years. AR
enhances various activities for consumers and businesses, particularly in industrial contexts …

Squeez'In: private authentication on smartphones based on squeezing gestures

X Yi, S Zhang, Z Pan, L Shi, F Han, Y Kong… - Proceedings of the …, 2023 - dl.acm.org
In this paper, we proposed Squeez'In, a technique on smartphones that enabled private
authentication by holding and squeezing the phone with a unique pattern. We first explored …

[PDF][PDF] Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview.

JL Cabra, C Parra, D Mendez… - J. Wirel. Mob. Networks …, 2022 - isyou.info
Smartphones contain access to user-sensitive information such as contacts, e-mails, e-
payments among others. Therefore, it is imperative that proper smartphone authentication …

VibPath: Two-Factor Authentication with Your Hand's Vibration Response to Unlock Your Phone

S Choi, J Yim, SJ Kim, Y Jin, D Wu, Z Jin - Proceedings of the ACM on …, 2023 - dl.acm.org
Technical advances in the smart device market have fixated smartphones at the heart of our
lives, warranting an ever more secure means of authentication. Although most smartphones …