[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

Unobtrusive interaction: a systematic literature review and expert survey

TCK Kwok, P Kiefer, M Raubal - Human–Computer Interaction, 2024 - Taylor & Francis
Unobtrusiveness has been highlighted as an important design principle in Human-
Computer Interaction (HCI). However, the understanding of unobtrusiveness in the literature …

Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices

Y Chen, J Sun, R Zhang… - 2015 IEEE conference on …, 2015 - ieeexplore.ieee.org
Multi-touch mobile devices have penetrated into everyday life to support personal and
business communications. Secure and usable authentication techniques are indispensable …

Tap-based user authentication for smartwatches

T Nguyen, N Memon - Computers & Security, 2018 - Elsevier
This paper presents TapMeIn, an eyes-free, two-factor authentication method for
smartwatches. It allows users to tap a memorable melody (tap-password) of their choice …

" I'm Literally Just Hoping This Will {Work:'}'Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities

D Napoli, K Baig, S Maqsood, S Chiasson - Seventeenth Symposium on …, 2021 - usenix.org
To successfully manage security and privacy threats, users must be able to perceive the
relevant information. However, a number of accessibility obstacles impede the access of …

Beat-PIN A User Authentication Mechanism for Wearable Devices Through Secret Beats

B Hutchins, A Reddy, W Jin, M Zhou, M Li… - Proceedings of the 2018 …, 2018 - dl.acm.org
Wearable devices that capture users' rich information regarding their daily activities have
unmet authentication needs. Today's solutions, which primarily rely on indirect …

HapticLock: Eyes-free authentication for mobile devices

G Dhandapani, J Ferguson, E Freeman - Proceedings of the 2021 …, 2021 - dl.acm.org
Smartphones provide access to increasing amounts of personal and sensitive information,
yet are often only secured using methods that are prone to observational attacks. We …

Theft-resilient mobile wallets: Transparently authenticating NFC users with tapping gesture biometrics

B Shrestha, M Mohamed, S Tamrakar… - Proceedings of the 32nd …, 2016 - dl.acm.org
The deployment of NFC technology on mobile phones is gaining momentum, enabling many
important applications such as NFC payments, access control for building or public transit …

Bad sounds good sounds: Attacking and defending tap-based rhythmic passwords using acoustic signals

SA Anand, P Shrestha, N Saxena - Cryptology and Network Security: 14th …, 2015 - Springer
Tapping-based rhythmic passwords have recently been proposed for the purpose of user
authentication and device pairing. They offer a usability advantage over traditional …

Picture superiority effect in authentication systems for the blind and visually impaired on a smartphone platform

YL Ho, SH Lau, A Azman - Universal Access in the Information Society, 2024 - Springer
Pictures are more likely to be remembered than words or text. For smartphone
authentication, graphical password interfaces employing both visual objects and auditory …