Security and privacy challenges in mobile cloud computing: Survey and way ahead

MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …

[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

{It's} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception

M Harbach, E Von Zezschwitz, A Fichtner… - 10th symposium on …, 2014 - usenix.org
A lot of research is being conducted into improving the usability and security of phone-
unlocking. There is however a severe lack of scientific data on users' current unlocking …

Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing

F Mathis, JH Williamson, K Vaniea… - ACM Transactions on …, 2021 - dl.acm.org
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …

Are you ready to lock?

S Egelman, S Jain, RS Portnoff, K Liao… - Proceedings of the …, 2014 - dl.acm.org
In addition to storing a plethora of sensitive personal and work information, smartphones
also store sensor data about users and their daily activities. In order to understand users' …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers

A De Luca, M Harbach, E von Zezschwitz… - Proceedings of the …, 2014 - dl.acm.org
In this paper, we present XSide, an authentication mechanism that uses the front and the
back of smartphones to enter stroke-based passwords. Users can switch sides during input …

Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems

F Mathis, K Vaniea, M Khamis - Proceedings of the 2021 chi conference …, 2021 - dl.acm.org
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …

Stay cool! understanding thermal attacks on mobile-based user authentication

Y Abdelrahman, M Khamis, S Schneegass… - Proceedings of the 2017 …, 2017 - dl.acm.org
PINs and patterns remain among the most widely used knowledge-based authentication
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …

BehaveSense: Continuous authentication for security-sensitive mobile apps using behavioral biometrics

Y Yang, B Guo, Z Wang, M Li, Z Yu, X Zhou - Ad Hoc Networks, 2019 - Elsevier
With the emergence of smartphones as an essential part of our daily lives, continuous
authentication becomes an urgent need which could efficiently protect user security and …