Game-based learning platform to enhance cybersecurity education

MA Khan, A Merabet, S Alkaabi, HE Sayed - Education and Information …, 2022‏ - Springer
Computer security competitions have been playing a significant role in encouraging
students to get into cybersecurity, as well as enhancing the cybersecurity education system …

[HTML][HTML] Enhancing the security of pattern unlock with surface EMG-based biometrics

Q Li, P Dong, J Zheng - Applied sciences, 2020‏ - mdpi.com
Pattern unlock is a popular screen unlock scheme that protects the sensitive data and
information stored in mobile devices from unauthorized access. However, it is also …

Bu-Dash: a universal and dynamic graphical password scheme (extended version)

P Andriotis, M Kirby, A Takasu - International Journal of Information …, 2023‏ - Springer
Passwordless authentication is a trending theme in cyber security, while biometrics
gradually replace knowledge-based schemes. However, Personal Identification Numbers …

2D-2FA: A new dimension in two-factor authentication

M Shirvanian, S Agrawal - Proceedings of the 37th Annual Computer …, 2021‏ - dl.acm.org
We propose a two-factor authentication (2FA) mechanism called 2D-2FA to address security
and usability issues in existing methods. 2D-2FA has three distinguishing features: First …

Android-GAN: Defending against android pattern attacks using multi-modal generative network as anomaly detector

SY Shin, YW Kang, YG Kim - Expert Systems with Applications, 2020‏ - Elsevier
Android pattern lock system is a popular form of user authentication extensively used in
mobile phones today. However, it is vulnerable to potential security attacks such as shoulder …

Does the layout of the Android unlock pattern affect the security and usability of the password?

L Zhang, Y Guo, X Guo, X Shao - Journal of Information Security and …, 2021‏ - Elsevier
Currently, Android unlock pattern is the most widely used graphical unlock pattern. But, as
similar to text passwords, user-generated Android graphical passwords usually have lower …

Hollow-pass: a dual-view pattern password against shoulder-surfing attacks

J Tan, DK Sarmah - … Symposium on Cyber Security, Cryptology, and …, 2023‏ - Springer
Abstract This paper presents Hollow-Pass, a developed solution that strengthens the
security of pattern passwords against shoulder-surfing attacks. It is a novel approach to …

[PDF][PDF] On the in-accuracy and influence of android pattern strength meters

M Golla, J Rimkus, AJ Aviv… - Workshop on Usable …, 2019‏ - maximiliangolla.com
A common method for hel** users select stronger authentication secrets, eg, passwords,
is to deploy a visual strength meter that provides feedback to the user while performing …

[كتاب][B] A Novel Two-Factor Mobile User Authenticationscheme Using Patterns and Surface EMG-Basedbiometrics

Q Li - 2020‏ - search.proquest.com
Screen unlock is one of the most important mechanisms to protect sensitive data and
information stored on mobile devices from unauthorized accesses. As one of the most …

Hollow-pass: hide your pattern password from shoulder surfers

J Tan - 2023‏ - essay.utwente.nl
This paper introduces Hollow-Pass, a new approach to combat shoulder surfing attacks on
pattern passwords, a type of graphical password (GP) schema. Hollow-Pass does not …