[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

A systematic review of PIN-entry methods resistant to shoulder-surfing attacks

F Binbeshr, MLM Kiah, LY Por, AA Zaidan - computers & security, 2021 - Elsevier
Although conventional PIN-entry methods are widely used in many daily authentication
procedures, they are highly susceptible to shoulder-surfing attacks. A plethora of PIN-entry …

Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing

M Ehatisham-ul-Haq, MA Azam, U Naeem… - Journal of Network and …, 2018 - Elsevier
Smartphones are inescapable devices, which are becoming more and more intelligent and
context-aware with emerging sensing, networking, and computing capabilities. They offer a …

Spatial frequency multiplexed meta-holography and meta-nanoprinting

J Deng, Y Yang, J Tao, L Deng, D Liu, Z Guan, G Li… - ACS …, 2019 - ACS Publications
Metasurfaces are flat structured surfaces that are designed to control the two-dimensional
distributions of phase, polarization, and intensity profiles of optical waves. Usually, the …

ShouldAR: Detecting Shoulder Surfing Attacks Using Multimodal Eye Tracking and Augmented Reality

M Corbett, B David-John, J Shang, B Ji - Proceedings of the ACM on …, 2024 - dl.acm.org
Shoulder surfing attacks (SSAs) are a type of observation attack designed to illicitly gather
sensitive data from" over the shoulder" of victims. This attack can be directed at mobile …

An investigation of shoulder surfing attacks on touch-based unlock events

S Schneegass, A Saad, R Heger… - Proceedings of the …, 2022 - dl.acm.org
This paper contributes to our understanding of user-centered attacks on smartphones. In
particular, we investigate the likelihood of so-called shoulder surfing attacks during touch …

Kid on the phone! Toward automatic detection of children on mobile devices

T Nguyen, A Roy, N Memon - Computers & Security, 2019 - Elsevier
Studies have shown that children can be exposed to smart devices at a very early age. This
has important implications on research in children–computer interaction, children online …

Tap-based user authentication for smartwatches

T Nguyen, N Memon - Computers & Security, 2018 - Elsevier
This paper presents TapMeIn, an eyes-free, two-factor authentication method for
smartwatches. It allows users to tap a memorable melody (tap-password) of their choice …

A robust biometric authentication system for handheld electronic devices by intelligently combining 3D finger motions and cerebral responses

SK Behera, P Kumar, DP Dogra… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Rapid advancement in sensor technology through miniaturization of electronic components
has enabled the consumer electronic (CE) research community including the manufacturers …

[HTML][HTML] Shoulder surfing: From an experimental study to a comparative framework

L Bošnjak, B Brumen - International Journal of Human-Computer Studies, 2019 - Elsevier
Shoulder surfing is an attack vector widely recognized as a real threat-enough to warrant
researchers dedicating a considerable effort toward designing novel authentication methods …