Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Shoulder surfing experiments: A systematic literature review
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …
authentication has become bloated with novel proposals aiming to replace textual …
This pin can be easily guessed: Analyzing the security of smartphone unlock pins
We provide the first comprehensive study of user-chosen 4-and 6-digit PINs (n= 1220)
collected on smartphones with participants being explicitly primed for device unlocking. We …
collected on smartphones with participants being explicitly primed for device unlocking. We …
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
{Charger-Surfing}: Exploiting a power line {Side-Channel} for smartphone information leakage
Touchscreen-based mobile devices such as smartphones and tablets are used daily by
billions of people for productivity and entertainment. This paper uncovers a new security …
billions of people for productivity and entertainment. This paper uncovers a new security …
Stay home! Conducting remote usability evaluations of novel real-world authentication systems using virtual reality
Evaluating interactive systems often requires researchers to invite user study participants to
the lab. However, corresponding evaluations often lack realism and participants are usually …
the lab. However, corresponding evaluations often lack realism and participants are usually …
On the security of smartphone unlock pins
In this article, we provide the first comprehensive study of user-chosen four-and six-digit
PINs (n= 1705) collected on smartphones with participants being explicitly primed for device …
PINs (n= 1705) collected on smartphones with participants being explicitly primed for device …
Draw it as shown: Behavioral pattern lock for mobile user authentication
Android pattern lock is still popularly used for mobile user authentication. Unfortunately,
however, many concerns have been raised regarding its security and usability. User-created …
however, many concerns have been raised regarding its security and usability. User-created …
PrivacyScout: Assessing vulnerability to shoulder surfing on mobile devices
One approach to mitigate shoulder surfing attacks on mobile devices is to detect the
presence of a bystander using the phone's front-facing camera. However, a person's face in …
presence of a bystander using the phone's front-facing camera. However, a person's face in …
Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research
Given the difficulties of studying the shoulder surfing resistance of authentication systems in
a live setting, researchers often ask study participants to shoulder surf authentications by …
a live setting, researchers often ask study participants to shoulder surf authentications by …
[HTML][HTML] Shoulder surfing: From an experimental study to a comparative framework
Shoulder surfing is an attack vector widely recognized as a real threat-enough to warrant
researchers dedicating a considerable effort toward designing novel authentication methods …
researchers dedicating a considerable effort toward designing novel authentication methods …