Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

Quantifying the security of graphical passwords: The case of android unlock patterns

S Uellenbeck, M Dürmuth, C Wolf, T Holz - Proceedings of the 2013 …, 2013 - dl.acm.org
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …

Captcha as graphical passwords—A new security primitive based on hard AI problems

BB Zhu, J Yan, G Bao, M Yang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …

Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices

E Von Zezschwitz, P Dunphy, A De Luca - Proceedings of the 15th …, 2013 - dl.acm.org
Graphical password systems based upon the recall and reproduction of visual patterns (eg
as seen on the Google Android platform) are assumed to have desirable usability and …

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers

A De Luca, M Harbach, E von Zezschwitz… - Proceedings of the …, 2014 - dl.acm.org
In this paper, we present XSide, an authentication mechanism that uses the front and the
back of smartphones to enter stroke-based passwords. Users can switch sides during input …

Shoulder surfing defence for recall-based graphical passwords

NH Zakaria, D Griffiths, S Brostoff, J Yan - Proceedings of the seventh …, 2011 - dl.acm.org
Graphical passwords are often considered prone to shoulder-surfing attacks, where
attackers can steal a user's password by peeking over his or her shoulder in the …

Towards reliable storage of 56-bit secrets in human memory

J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …

Dissecting pattern unlock: The effect of pattern strength meter on pattern selection

C Sun, Y Wang, J Zheng - Journal of Information Security and Applications, 2014 - Elsevier
Pattern unlock is one of the entry protection mechanisms in Android system for unlocking the
screen. By connecting 4–9 dots in a 3× 3 grid, the user can set up an unlock pattern which is …

Enhancing the security of FinTech applications with map-based graphical password authentication

W Meng, L Zhu, W Li, J Han, Y Li - Future Generation Computer Systems, 2019 - Elsevier
With the rapid development of information technology (IT) in financial industry, financial
technology (FinTech) has become an emerging area for enterprises and organizations. Due …