Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Shoulder surfing experiments: A systematic literature review
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …
authentication has become bloated with novel proposals aiming to replace textual …
{It's} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception
A lot of research is being conducted into improving the usability and security of phone-
unlocking. There is however a severe lack of scientific data on users' current unlocking …
unlocking. There is however a severe lack of scientific data on users' current unlocking …
Understanding shoulder surfing in the wild: Stories from users and observers
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …
attacks. However, there is little work about shoulder surfing situations in the real world. We …
Adversary models for mobile device authentication
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
Are you ready to lock?
In addition to storing a plethora of sensitive personal and work information, smartphones
also store sensor data about users and their daily activities. In order to understand users' …
also store sensor data about users and their daily activities. In order to understand users' …
Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
The anatomy of smartphone unlocking: A field study of android lock screens
To prevent unauthorized parties from accessing data stored on their smartphones, users
have the option of enabling a" lock screen" that requires a secret code (eg, PIN, drawing a …
have the option of enabling a" lock screen" that requires a secret code (eg, PIN, drawing a …
Usability and security of text passwords on mobile devices
Recent research has improved our understanding of how to create strong, memorable text
passwords. However, this research has generally been in the context of desktops and …
passwords. However, this research has generally been in the context of desktops and …
A shoulder surfing resistant graphical authentication system
Authentication based on passwords is used largely in applications for computer security and
privacy. However, human actions such as choosing bad passwords and inputting passwords …
privacy. However, human actions such as choosing bad passwords and inputting passwords …
Stay cool! understanding thermal attacks on mobile-based user authentication
PINs and patterns remain among the most widely used knowledge-based authentication
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …