[HTML][HTML] Shoulder surfing experiments: A systematic literature review
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …
authentication has become bloated with novel proposals aiming to replace textual …
Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks
The rapid advancement of information technology (IT) has given rise to a new era of efficient
and fast communication and transactions. However, the increasing adoption of and reliance …
and fast communication and transactions. However, the increasing adoption of and reliance …
A comparison of a touch-gesture-and a keystroke-based password method: toward shoulder-surfing resistant mobile user authentication
The pervasive use of mobile devices exposes users to an elevated risk of shoulder-surfing
attacks. Despite the prior work on shoulder-surfing resistance of mobile user authentication …
attacks. Despite the prior work on shoulder-surfing resistance of mobile user authentication …
Enhanced cell phone security: An ultrasonic and sensor fusion-based persistent cell phone protection method integrating anti-theft & identity authentication
J Zhang, L **e, L He, Z Wang, J Chen - Computers & Security, 2025 - Elsevier
With the rapid development of the Internet of Things, cell phones inevitably involve people's
privacy and property information. Therefore, ensuring cell phone security is of great …
privacy and property information. Therefore, ensuring cell phone security is of great …
VibroAuth: authentication with haptics based non-visual, rearranged keypads to mitigate shoulder surfing attacks
Abstract PIN (Personal Identification Number) code entry is a widely used authentication
method used on smartphones, ATMs, etc. However, it is typically subject to shoulder surfing …
method used on smartphones, ATMs, etc. However, it is typically subject to shoulder surfing …
Design and implementation of cost effective multi-factor authentication framework for ATM systems
Banks and financial institutions all over the world have adopted and continue to adopt
Automated Teller Machine (ATM) systems into their transactions to extend banking hours …
Automated Teller Machine (ATM) systems into their transactions to extend banking hours …
Examining security and usability aspects of knowledge-based authentication methods
Graphical passwords are considered to be one of the promising alternatives to conventional
textual passwords. However, while offering potential theoretical improvements over their …
textual passwords. However, while offering potential theoretical improvements over their …
RISET: Secure Eye-Tracking Password Authentication with Random Image Sequence
The development of authentication systems plays a crucial role in ensuring security and user
privacy across various domains. One such authentication mechanism is Transparent Image …
privacy across various domains. One such authentication mechanism is Transparent Image …
User Impersonation Detection and Authentication Using Image Based OTP
AR Rajendran, S Kumar, A Mukeshvar… - 2023 Innovations in …, 2023 - ieeexplore.ieee.org
In this age of the internet and technology, it is very important to be vigilant with one's devices
and have safe and secure passwords to avoid several types of crimes. In this paper, we …
and have safe and secure passwords to avoid several types of crimes. In this paper, we …
Behaviors of unwarranted password identification via shoulder-surfing during mobile authentication
Password-based mobile user authentication is vulnerable to shoulder-surfing. Despite the
increasing research on user password entry behavior and mobile security, there is limited …
increasing research on user password entry behavior and mobile security, there is limited …