A survey on touch dynamics authentication in mobile devices

PS Teh, N Zhang, ABJ Teoh, K Chen - Computers & Security, 2016 - Elsevier
There have been research activities in the area of keystroke dynamics biometrics on
physical keyboards (desktop computers or conventional mobile phones) undertaken in the …

Security and usability in knowledge-based user authentication: A review

C Katsini, M Belk, C Fidas, N Avouris… - Proceedings of the 20th …, 2016 - dl.acm.org
This paper presents a comprehensive review of state-of-the-art research works in
knowledge-based user authentication, covering the security and usability aspects of the …

Usability and security of text passwords on mobile devices

W Melicher, D Kurilova, SM Segreti, P Kalvani… - Proceedings of the …, 2016 - dl.acm.org
Recent research has improved our understanding of how to create strong, memorable text
passwords. However, this research has generally been in the context of desktops and …

Verifying and validating simulation models

RG Sargent - Proceedings of the 28th conference on Winter …, 1996 - dl.acm.org
This paper discusses verification and validation of simulation models. The different
approaches to deciding model validity am presented; how model verification and validation …

[HTML][HTML] An IoT system for remote monitoring of patients at home

KH Park, J Park, JW Lee - Applied Sciences, 2017 - mdpi.com
Application areas that utilize the concept of IoT can be broadened to healthcare or remote
monitoring areas. In this paper, a remote monitoring system for patients at home in IoT …

Honey, I shrunk the keys: Influences of mobile devices on password composition and authentication performance

E Von Zezschwitz, A De Luca… - Proceedings of the 8th …, 2014 - dl.acm.org
In this paper, we present the results of two studies on the influence of mobile devices on
authentication performance and password composition. A pre-study in the lab (n= 24) …

The interplay between humans, technology and user authentication: A cognitive processing perspective

M Belk, C Fidas, P Germanakos, G Samaras - Computers in Human …, 2017 - Elsevier
This paper investigates the interplay among human cognitive processing differences (field
dependence vs. field independence), alternative interaction device types (desktop vs. touch) …

A survey of android mobile phone authentication schemes

D Kunda, M Chishimba - Mobile Networks and Applications, 2021 - Springer
The Android operating system is the most popular mobile operating system resulting in a
great number of applications being developed for the platform. This makes them vulnerable …

Why aren't users using protection? investigating the usability of smartphone locking

N Micallef, M Just, L Baillie, M Halvey… - Proceedings of the 17th …, 2015 - dl.acm.org
One of the main reasons why smartphone users do not adopt screen locking mechanisms is
due to the inefficiency of entering a PIN/pattern each time they use their phone. To address …

Squeez'In: private authentication on smartphones based on squeezing gestures

X Yi, S Zhang, Z Pan, L Shi, F Han, Y Kong… - Proceedings of the …, 2023 - dl.acm.org
In this paper, we proposed Squeez'In, a technique on smartphones that enabled private
authentication by holding and squeezing the phone with a unique pattern. We first explored …