Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

Continuous mobile authentication using touchscreen gestures

T Feng, Z Liu, KA Kwon, W Shi… - … IEEE conference on …, 2012 - ieeexplore.ieee.org
Securing the sensitive data stored and accessed from mobile devices makes user
authentication a problem of paramount importance. The tension between security and …

Detecting and interpreting real-world and security gestures on touch and hover sensitive devices

WC Westerman, MM Haggerty - US Patent 7,877,707, 2011 - Google Patents
(57) ABSTRACT “Real-world” gestures such as hand or finger movements/orientations that
are generally recognized to mean certain things (eg, an “OK” hand signal generally …

Quantifying the security of graphical passwords: The case of android unlock patterns

S Uellenbeck, M Dürmuth, C Wolf, T Holz - Proceedings of the 2013 …, 2013 - dl.acm.org
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …

Behavioural biometrics: a survey and classification

RV Yampolskiy, V Govindaraju - International Journal of …, 2008 - inderscienceonline.com
This study is a survey and classification of the state-of-the-art in behavioural biometrics
which is based on skills, style, preference, knowledge, motor-skills or strategy used by …

Making graphic-based authentication secure against smudge attacks

E Von Zezschwitz, A Koslow, A De Luca… - Proceedings of the …, 2013 - dl.acm.org
Most of today's smartphones and tablet computers feature touchscreens as the main way of
interaction. By using these touchscreens, oily residues of the users' fingers, smudge, remain …

The shoulder surfing resistant graphical password authentication technique

MAS Gokhale, VS Waghmare - Procedia Computer Science, 2016 - Elsevier
Nowadays computer as well as information security is the most significant challenge.
Authorized users should access the system or information. Authorization can't occur without …

Detecting and interpreting real-world and security gestures on touch and hover sensitive devices

WC Westerman, MM Haggerty - US Patent 9,367,235, 2016 - Google Patents
(57) ABSTRACT “Real-world” gestures such as hand or finger movements/orientations that
are generally recognized to mean certain things (eg, an “OK” hand signal generally …

Biometric authentication using mouse gesture dynamics

B Sayed, I Traoré, I Woungang… - IEEE systems …, 2013 - ieeexplore.ieee.org
The mouse dynamics biometric is a behavioral biometric technology that extracts and
analyzes the movement characteristics of the mouse input device when a computer user …

[PDF][PDF] A survey on the use of graphical passwords in security.

H Gao, W Jia, F Ye, L Ma - J. Softw., 2013 - jsoftware.us
Beginning around 1996, numerous graphical password schemes have been proposed,
motivated by improving password usability and security, two key factors in password scheme …