[HTML][HTML] Shoulder surfing experiments: A systematic literature review

L Bošnjak, B Brumen - Computers & Security, 2020 - Elsevier
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …

Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

LA Adebimpe, IO Ng, MYI Idris, M Okmi, CS Ku… - Applied Sciences, 2023 - mdpi.com
The rapid advancement of information technology (IT) has given rise to a new era of efficient
and fast communication and transactions. However, the increasing adoption of and reliance …

A comparison of a touch-gesture-and a keystroke-based password method: toward shoulder-surfing resistant mobile user authentication

L Zhou, K Wang, J Lai, D Zhang - IEEE Transactions on Human …, 2023 - ieeexplore.ieee.org
The pervasive use of mobile devices exposes users to an elevated risk of shoulder-surfing
attacks. Despite the prior work on shoulder-surfing resistance of mobile user authentication …

Enhanced cell phone security: An ultrasonic and sensor fusion-based persistent cell phone protection method integrating anti-theft & identity authentication

J Zhang, L **e, L He, Z Wang, J Chen - Computers & Security, 2025 - Elsevier
With the rapid development of the Internet of Things, cell phones inevitably involve people's
privacy and property information. Therefore, ensuring cell phone security is of great …

VibroAuth: authentication with haptics based non-visual, rearranged keypads to mitigate shoulder surfing attacks

M Varma, S Watson, L Chan, R Peiris - International Conference on …, 2022 - Springer
Abstract PIN (Personal Identification Number) code entry is a widely used authentication
method used on smartphones, ATMs, etc. However, it is typically subject to shoulder surfing …

Design and implementation of cost effective multi-factor authentication framework for ATM systems

NAK Abiew, SO Banning - Asian Journal of Research in …, 2020 - journal.send2sub.com
Banks and financial institutions all over the world have adopted and continue to adopt
Automated Teller Machine (ATM) systems into their transactions to extend banking hours …

Examining security and usability aspects of knowledge-based authentication methods

L Bošnjak, B Brumen - 2019 42nd International Convention on …, 2019 - ieeexplore.ieee.org
Graphical passwords are considered to be one of the promising alternatives to conventional
textual passwords. However, while offering potential theoretical improvements over their …

RISET: Secure Eye-Tracking Password Authentication with Random Image Sequence

PTW Gautama, T Ahmad - 2023 14th International Conference …, 2023 - ieeexplore.ieee.org
The development of authentication systems plays a crucial role in ensuring security and user
privacy across various domains. One such authentication mechanism is Transparent Image …

User Impersonation Detection and Authentication Using Image Based OTP

AR Rajendran, S Kumar, A Mukeshvar… - 2023 Innovations in …, 2023 - ieeexplore.ieee.org
In this age of the internet and technology, it is very important to be vigilant with one's devices
and have safe and secure passwords to avoid several types of crimes. In this paper, we …

Behaviors of unwarranted password identification via shoulder-surfing during mobile authentication

L Zhou, K Wang, J Lai, D Zhang - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Password-based mobile user authentication is vulnerable to shoulder-surfing. Despite the
increasing research on user password entry behavior and mobile security, there is limited …