This pin can be easily guessed: Analyzing the security of smartphone unlock pins

P Markert, DV Bailey, M Golla… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We provide the first comprehensive study of user-chosen 4-and 6-digit PINs (n= 1220)
collected on smartphones with participants being explicitly primed for device unlocking. We …

WINK: Wireless inference of numerical keystrokes via zero-training spatiotemporal analysis

E Yang, Q He, S Fang - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Sensitive numbers play an unparalleled role in identification and authentication. Recent
research has revealed plenty of side-channel attacks to infer keystrokes, which require …

Recent advances in mobile touch screen security authentication methods: A systematic literature review

TM Ibrahim, AA Alarood, H Chiroma, MA Al-garadi… - Computers & …, 2019 - Elsevier
The security of the smartphone touch screen has attracted considerable attention from
academics as well as industry and security experts. The maximum security of the mobile …

Passphrase and keystroke dynamics authentication: Usable security

B Bhana, S Flowerday - Computers & Security, 2020 - Elsevier
It was found that employees spend a total of 2.25 days within 60 days on password-related
activities. The time consumed by this is unproductive and has a negative impact on usability …

On the security of smartphone unlock pins

P Markert, DV Bailey, M Golla, M Dürmuth… - ACM Transactions on …, 2021 - dl.acm.org
In this article, we provide the first comprehensive study of user-chosen four-and six-digit
PINs (n= 1705) collected on smartphones with participants being explicitly primed for device …

Two-factor authentication for keyless entry system via finger-induced vibrations

H Jiang, P Ji, T Zhang, H Cao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Keyless entry systems (KES) have become popular due to their high user-friendliness, while
fingerprint and digital password authentication are two of the most widely used unlocking …

Searchauth: neural architecture search-based continuous authentication using auto augmentation search

Y Li, J Luo, S Deng, G Zhou - ACM Transactions on Sensor Networks, 2023 - dl.acm.org
Mobile devices have been playing significant roles in our daily lives, which has made device
security and privacy protection extremely important. These mobile devices storing user …

Echovib: Exploring voice authentication via unique non-linear vibrations of short replayed speech

SA Anand, J Liu, C Wang, M Shirvanian… - Proceedings of the …, 2021 - dl.acm.org
Recent advances in speaker verification and speech processing technology have seen
voice authentication being adopted on a wide scale in commercial applications like online …

Concise and Efficient Multi-Identity Fully Homomorphic Encryption Scheme

G Tu, W Liu, T Zhou, X Yang, F Zhang - IEEE Access, 2024 - ieeexplore.ieee.org
Combining multi-key fully homomorphic encryption (MKFHE) and identity-based encryption
(IBE) to construct multi-identity based fully homomorphic encryption (MIBFHE) scheme can …

On the security of biometrics and fuzzy commitment cryptosystems: A study on gait authentication

EA Rúa, D Preuveneers, W Joosen - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As biometric templates consist of highly correlated features, the real security level offered by
biometric authentication systems remains an open research question. In this work we …