[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

Explore-a-nation: Combining graphical and alphanumeric authentication

LN Tiller, CA Angelini, SC Leibner, JD Still - … , HCI-CPT 2019, Held as Part …, 2019 - Springer
Graphical authentication has been a proposed solution to the usability and memorability
issues seen with traditional alphanumeric passwords. However, graphical authentication …

Over-the-shoulder attack resistant graphical authentication schemes impact on working memory

JD Still, AA Cain - Advances in Human Factors in Cybersecurity …, 2020 - Springer
Alphanumeric passwords are the most commonly employed authentication scheme.
However, technical security requirements often make alphanumeric authentication difficult to …

Graphical authentication passcode memorability: Context, length, and number

AA Cain, JD Still - Proceedings of the Human Factors and …, 2019 - journals.sagepub.com
Authentication verifies users' identities to protect against costly attacks. Graphical
authentication schemes utilize pictures as passcodes rather than strings of characters …

Ocenjevanje ranljivosti gesel na napad z opazovanjem: doctoral dissertation

L Bošnjak - 2022 - dk.um.si
Problem preverjanja pristnosti ostaja eden ključnih izzivov na področju informacijske
varnosti. Zaznamujejo ga naraščujoče varnostne pomanjkljivosti besedilnih gesel, ki že pol …

Evaluation of Passwords' Vulnerability To Shoulder Surfing Attacks

L Bošnjak - 2022 - search.proquest.com
The password security problem is one of the most critical challenges in the field of
information security. It is characterized by the increasing security deficiencies of textual …

Authentication Schemes' Impact on Working Memory

JD Mator - 2021 - search.proquest.com
Authentication is the process by which a computing system validates a user's identity.
Although this process is necessary for system security, users view authentication as a …

[PDF][PDF] Shoulder Surfing Experiments: A Systematic

L Bošnjaka, B Brumena - researchgate.net
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …