Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks
Devising a user authentication scheme based on personal identification numbers (PINs) that
is both secure and practically usable is a challenging problem. The greatest difficulty lies …
is both secure and practically usable is a challenging problem. The greatest difficulty lies …
On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability
The design of leakage-resilient password systems (LRPSes) in the absence of trusted
devices remains a challenging problem today despite two decades of intensive research in …
devices remains a challenging problem today despite two decades of intensive research in …
[PDF][PDF] Pitfalls of shoulder surfing studies
We review empirical studies that evaluate the resilience of various PIN entry methods
against human shoulder surfers. Conducting such studies is challenging because …
against human shoulder surfers. Conducting such studies is challenging because …
Timing attacks on cognitive authentication schemes
Classical password/PIN-based authentication methods have proven to be vulnerable to a
broad range of observation attacks (such as key-logging, video-recording or shoulder …
broad range of observation attacks (such as key-logging, video-recording or shoulder …
SteganoPIN: Two-faced human–machine interface for practical enforcement of PIN entry security
T Kwon, S Na - IEEE Transactions on Human-Machine Systems, 2015 - ieeexplore.ieee.org
Users typically reuse the same personalized identification number (PIN) for multiple systems
and in numerous sessions. Direct PIN entries are highly susceptible to shoulder-surfing …
and in numerous sessions. Direct PIN entries are highly susceptible to shoulder-surfing …
Color wheel pin: Usable and resilient ATM authentication
We are witnessing a growing demand for ATM authentication solutions that overcome the
limitations of the de facto standard mechanism based on magnetic card and numeric PIN …
limitations of the de facto standard mechanism based on magnetic card and numeric PIN …
Leakage-resilient password entry: challenges, design, and evaluation
Password leakage is one of the most serious threats for password-based user
authentication. Although this problem has been extensively investigated over the last two …
authentication. Although this problem has been extensively investigated over the last two …
When eye-tracking meets cognitive modeling: Applications to cyber security systems
Human cognitive modeling techniques and related software tools have been widely used by
researchers and practitioners to evaluate the effectiveness of user interface (UI) designs and …
researchers and practitioners to evaluate the effectiveness of user interface (UI) designs and …
Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user
authentication protocols against passive observers, and proposed a generic counting based …
authentication protocols against passive observers, and proposed a generic counting based …
Analysis and Improvement on a Unimodal Haptic PIN‐Entry Method
MK Lee, J Yoo, H Nam - Mobile Information Systems, 2017 - Wiley Online Library
User authentication is a process in which a user of a system proves his/her identity to
acquire access permission. An effective user authentication method should be both secure …
acquire access permission. An effective user authentication method should be both secure …