Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Shoulder surfing experiments: A systematic literature review
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …
authentication has become bloated with novel proposals aiming to replace textual …
Are you ready to lock?
In addition to storing a plethora of sensitive personal and work information, smartphones
also store sensor data about users and their daily activities. In order to understand users' …
also store sensor data about users and their daily activities. In order to understand users' …
Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication
Although mobile devices provide access to a plethora of sensitive data, most users still only
protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …
protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …
User-generated free-form gestures for authentication: Security and memorability
This paper studies the security and memorability of free-form multitouch gestures for mobile
authentication. Towards this end, we collected a dataset with a generate-test-retest …
authentication. Towards this end, we collected a dataset with a generate-test-retest …
Investigating the third dimension for authentication in immersive virtual reality and in the real world
Immersive Virtual Reality (IVR) is a growing 3D environment, where social and commercial
applications will require user authentication. Similarly, smart homes in the real world (RW) …
applications will require user authentication. Similarly, smart homes in the real world (RW) …
Towards baselines for shoulder surfing on mobile authentication
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime
target for credential leaking via shoulder surfing, a form of an observation attack. While the …
target for credential leaking via shoulder surfing, a form of an observation attack. While the …
Just gaze and wave: Exploring the use of gaze and gestures for shoulder-surfing resilient authentication
Eye-gaze and mid-air gestures are promising for resisting various types of side-channel
attacks during authentication. However, to date, a comparison of the different authentication …
attacks during authentication. However, to date, a comparison of the different authentication …
Influences of human cognition and visual behavior on password strength during picture password composition
Visual attention, search, processing and comprehension are important cognitive tasks
during a graphical password composition activity. Aiming to shed light on whether individual …
during a graphical password composition activity. Aiming to shed light on whether individual …
Authentication melee: A usability analysis of seven web authentication systems
Passwords continue to dominate the authentication landscape in spite of numerous
proposals to replace them. Even though usability is a key factor in replacing passwords, very …
proposals to replace them. Even though usability is a key factor in replacing passwords, very …