Security and privacy challenges in mobile cloud computing: Survey and way ahead
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …
mobile devices. However, the growth of mobile computing can be enhanced by integrating …
[HTML][HTML] Shoulder surfing experiments: A systematic literature review
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …
authentication has become bloated with novel proposals aiming to replace textual …
{It's} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception
A lot of research is being conducted into improving the usability and security of phone-
unlocking. There is however a severe lack of scientific data on users' current unlocking …
unlocking. There is however a severe lack of scientific data on users' current unlocking …
Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
Are you ready to lock?
In addition to storing a plethora of sensitive personal and work information, smartphones
also store sensor data about users and their daily activities. In order to understand users' …
also store sensor data about users and their daily activities. In order to understand users' …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
Now you see me, now you don't: protecting smartphone authentication from shoulder surfers
In this paper, we present XSide, an authentication mechanism that uses the front and the
back of smartphones to enter stroke-based passwords. Users can switch sides during input …
back of smartphones to enter stroke-based passwords. Users can switch sides during input …
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
Stay cool! understanding thermal attacks on mobile-based user authentication
PINs and patterns remain among the most widely used knowledge-based authentication
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …
BehaveSense: Continuous authentication for security-sensitive mobile apps using behavioral biometrics
With the emergence of smartphones as an essential part of our daily lives, continuous
authentication becomes an urgent need which could efficiently protect user security and …
authentication becomes an urgent need which could efficiently protect user security and …