The nudge puzzle: matching nudge interventions to cybersecurity decisions
Nudging is a promising approach, in terms of influencing people to make advisable choices
in a range of domains, including cybersecurity. However, the processes underlying the …
in a range of domains, including cybersecurity. However, the processes underlying the …
[HTML][HTML] Mobile behavioral biometrics for passive authentication
Current mobile user authentication systems based on PIN codes, fingerprint, and face
recognition have several shortcomings. Such limitations have been addressed in the …
recognition have several shortcomings. Such limitations have been addressed in the …
This pin can be easily guessed: Analyzing the security of smartphone unlock pins
We provide the first comprehensive study of user-chosen 4-and 6-digit PINs (n= 1220)
collected on smartphones with participants being explicitly primed for device unlocking. We …
collected on smartphones with participants being explicitly primed for device unlocking. We …
Towards baselines for shoulder surfing on mobile authentication
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime
target for credential leaking via shoulder surfing, a form of an observation attack. While the …
target for credential leaking via shoulder surfing, a form of an observation attack. While the …
Investigating the third dimension for authentication in immersive virtual reality and in the real world
Immersive Virtual Reality (IVR) is a growing 3D environment, where social and commercial
applications will require user authentication. Similarly, smart homes in the real world (RW) …
applications will require user authentication. Similarly, smart homes in the real world (RW) …
[PDF][PDF] Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview.
Smartphones contain access to user-sensitive information such as contacts, e-mails, e-
payments among others. Therefore, it is imperative that proper smartphone authentication …
payments among others. Therefore, it is imperative that proper smartphone authentication …
Better, funner, stronger: a gameful approach to nudge people into making less predictable graphical password choices
Graphical user authentication (GUA) is a common alternative to text-based user
authentication, where people are required to draw graphical passwords on background …
authentication, where people are required to draw graphical passwords on background …
On the security of smartphone unlock pins
In this article, we provide the first comprehensive study of user-chosen four-and six-digit
PINs (n= 1705) collected on smartphones with participants being explicitly primed for device …
PINs (n= 1705) collected on smartphones with participants being explicitly primed for device …
Bu-Dash: a universal and dynamic graphical password scheme (extended version)
Passwordless authentication is a trending theme in cyber security, while biometrics
gradually replace knowledge-based schemes. However, Personal Identification Numbers …
gradually replace knowledge-based schemes. However, Personal Identification Numbers …
Nudging folks towards stronger password choices: providing certainty is the key
Persuading people to choose strong passwords is challenging. One way to influence
password strength, as and when people are making the choice, is to tweak the choice …
password strength, as and when people are making the choice, is to tweak the choice …