[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing

F Mathis, JH Williamson, K Vaniea… - ACM Transactions on …, 2021 - dl.acm.org
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …

Are you ready to lock?

S Egelman, S Jain, RS Portnoff, K Liao… - Proceedings of the …, 2014 - dl.acm.org
In addition to storing a plethora of sensitive personal and work information, smartphones
also store sensor data about users and their daily activities. In order to understand users' …

User-generated free-form gestures for authentication: Security and memorability

M Sherman, G Clark, Y Yang, S Sugrim… - Proceedings of the 12th …, 2014 - dl.acm.org
This paper studies the security and memorability of free-form multitouch gestures for mobile
authentication. Towards this end, we collected a dataset with a generate-test-retest …

GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication

M Khamis, M Hassib, E Zezschwitz, A Bulling… - Proceedings of the 19th …, 2017 - dl.acm.org
Although mobile devices provide access to a plethora of sensitive data, most users still only
protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …

Towards baselines for shoulder surfing on mobile authentication

AJ Aviv, JT Davin, F Wolf, R Kuber - Proceedings of the 33rd Annual …, 2017 - dl.acm.org
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime
target for credential leaking via shoulder surfing, a form of an observation attack. While the …

Investigating the third dimension for authentication in immersive virtual reality and in the real world

C George, M Khamis, D Buschek… - 2019 ieee conference …, 2019 - ieeexplore.ieee.org
Immersive Virtual Reality (IVR) is a growing 3D environment, where social and commercial
applications will require user authentication. Similarly, smart homes in the real world (RW) …

Influences of human cognition and visual behavior on password strength during picture password composition

C Katsini, C Fidas, GE Raptis, M Belk… - Proceedings of the …, 2018 - dl.acm.org
Visual attention, search, processing and comprehension are important cognitive tasks
during a graphical password composition activity. Aiming to shed light on whether individual …

Authentication melee: A usability analysis of seven web authentication systems

S Ruoti, B Roberts, K Seamons - … of the 24th international conference on …, 2015 - dl.acm.org
Passwords continue to dominate the authentication landscape in spite of numerous
proposals to replace them. Even though usability is a key factor in replacing passwords, very …

Just gaze and wave: Exploring the use of gaze and gestures for shoulder-surfing resilient authentication

Y Abdrabou, M Khamis, RM Eisa, S Ismail… - Proceedings of the 11th …, 2019 - dl.acm.org
Eye-gaze and mid-air gestures are promising for resisting various types of side-channel
attacks during authentication. However, to date, a comparison of the different authentication …