Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability
The design of leakage-resilient password systems (LRPSes) in the absence of trusted
devices remains a challenging problem today despite two decades of intensive research in …
devices remains a challenging problem today despite two decades of intensive research in …
Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks
Devising a user authentication scheme based on personal identification numbers (PINs) that
is both secure and practically usable is a challenging problem. The greatest difficulty lies …
is both secure and practically usable is a challenging problem. The greatest difficulty lies …
[PDF][PDF] Pitfalls of shoulder surfing studies
We review empirical studies that evaluate the resilience of various PIN entry methods
against human shoulder surfers. Conducting such studies is challenging because …
against human shoulder surfers. Conducting such studies is challenging because …
Timing attacks on cognitive authentication schemes
Classical password/PIN-based authentication methods have proven to be vulnerable to a
broad range of observation attacks (such as key-logging, video-recording or shoulder …
broad range of observation attacks (such as key-logging, video-recording or shoulder …
SteganoPIN: Two-faced human–machine interface for practical enforcement of PIN entry security
T Kwon, S Na - IEEE Transactions on Human-Machine Systems, 2015 - ieeexplore.ieee.org
Users typically reuse the same personalized identification number (PIN) for multiple systems
and in numerous sessions. Direct PIN entries are highly susceptible to shoulder-surfing …
and in numerous sessions. Direct PIN entries are highly susceptible to shoulder-surfing …
When eye-tracking meets cognitive modeling: applications to cyber security systems
Human cognitive modeling techniques and related software tools have been widely used by
researchers and practitioners to evaluate the effectiveness of user interface (UI) designs and …
researchers and practitioners to evaluate the effectiveness of user interface (UI) designs and …
Leakage-resilient password entry: challenges, design, and evaluation
Password leakage is one of the most serious threats for password-based user
authentication. Although this problem has been extensively investigated over the last two …
authentication. Although this problem has been extensively investigated over the last two …
Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user
authentication protocols against passive observers, and proposed a generic counting based …
authentication protocols against passive observers, and proposed a generic counting based …
Color wheel pin: Usable and resilient ATM authentication
We are witnessing a growing demand for ATM authentication solutions that overcome the
limitations of the de facto standard mechanism based on magnetic card and numeric PIN …
limitations of the de facto standard mechanism based on magnetic card and numeric PIN …
Review of Cognitive Modeling Software Tools
A large number of cognitive models have been developed and widely used in the HCI
domain. GOMS (Gray et al (1993) Hum Comput Interact 8 (3): 237–309; John and Kieras …
domain. GOMS (Gray et al (1993) Hum Comput Interact 8 (3): 237–309; John and Kieras …