[HTML][HTML] Shoulder surfing: From an experimental study to a comparative framework

L Bošnjak, B Brumen - International Journal of Human-Computer Studies, 2019 - Elsevier
Shoulder surfing is an attack vector widely recognized as a real threat-enough to warrant
researchers dedicating a considerable effort toward designing novel authentication methods …

An evaluation of the Game Changer Password System: A new approach to password security

CT McLennan, P Manning, SE Tuft - International Journal of Human …, 2017 - Elsevier
We propose–and experimentally test–a mnemonic variant of password security that uses
game positions as passwords. In Experiment 1, we report accuracy and reaction time data …

Security questions education: exploring gamified features and functionalities

N Micallef, NAG Arachchilage - Information & Computer Security, 2018 - emerald.com
Purpose Security questions are one of the techniques used to recover forgotten passwords.
However, security questions have both security and memorability limitations. To limit their …

Bioelectrical user authentication

TS Enamamu - 2019 - plymouth.researchcommons.org
There has been tremendous growth of mobile devices, which includes mobile phones,
tablets etc. in recent years. The use of mobile phone is more prevalent due to their …

A Serious Game Design: Nudging Users' Memorability of Security Questions

N Micallef, NAG Arachchilage - arXiv preprint arXiv:1709.08167, 2017 - arxiv.org
Security questions are one of the techniques used to recover passwords. The main limitation
of security questions is that users find strong answers difficult to remember. This leads users …

[PDF][PDF] User authentication using native language passwords

S Malempati, S Mogalla - International Journal of Network Security & Its …, 2011 - Citeseer
Information security is necessary for any organization. Intrusion prevention is the basic level
of security which requires user authentication. User can be authenticated to a machine by …

Information technology security and human risk: Exploring factors of unintended insider threat and organizational resilience

EE Thompson - 2014 - search.proquest.com
That organizations face threats to the security of their computer systems from external
hackers is well documented. Intentional or unintentional behaviors by organizational …

Ocenjevanje ranljivosti gesel na napad z opazovanjem: doctoral dissertation

L Bošnjak - 2022 - dk.um.si
Problem preverjanja pristnosti ostaja eden ključnih izzivov na področju informacijske
varnosti. Zaznamujejo ga naraščujoče varnostne pomanjkljivosti besedilnih gesel, ki že pol …

Evaluation of Passwords' Vulnerability To Shoulder Surfing Attacks

L Bošnjak - 2022 - search.proquest.com
The password security problem is one of the most critical challenges in the field of
information security. It is characterized by the increasing security deficiencies of textual …