References
- C. S. Weir, G. Douglas, T. Richardson, and M. Jack, "Usable security: User preferences for authenticationmethods in eBanking and the effects of experience," Interacting with Computers, vol. 22, no. 3, pp. 153-164, 2010. https://doi.org/10.1016/j.intcom.2009.10.001
- V. Roth, K. Richter, and R. Freidinger, "A PIN-entry method resilient against shoulder surfing," ACM CCS '04, pp. 236-245, 2004.
- D. S. Tan, P. Keyani, and M. Czerwinski, "Spy-resistant keyboard: more secure password entry on public touch screen displays," ACM OZCHI '05, 2005.
- A. De Luca, K. Hertzschuch, and H. Hussmann, "ColorPIN - securing PIN entry through indirect input," CHI '10, pp. 1103-1106, 2010.
- D. Wang, Q. Gu, X, Huang, P. Wang, "Understanding Human-Chosen PINs: Characteristics, Distribution and Security," ASIACCS '17, pp. 372-385, 2017
- A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, "Smudge attacks on smartphone touch screens," in Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT '10), 2010.
- E. von Zezschwitz, A. Koslow, A. De Luca, and H. Hussmann, "Making graphic-based authentication secure against smudge attacks," in Proceedings of the 18th International Conference on Intelligent User Interfaces (IUI '13), pp. 277-286, 2013.
- M.-K. Lee, "Security notions and advanced method for human shoulder-surfing resistant PIN-entry," IEEE Transactions on Information Forensics and Security, vol. 9, no. 4, pp. 695-708, 2014. https://doi.org/10.1109/TIFS.2014.2307671
- T. Kwon, S. Shin, and S. Na, "Covert attentional shoulder surfing: Human adversaries are more powerful than expected," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 44, no. 6, pp. 716-727, 2014. https://doi.org/10.1109/TSMC.2013.2270227
- R. Raguram, A. M. White, D. Goswami, F. Monrose, and J.-M. Frahm, "iSpy: Automatic reconstruction of typed input from compromising reflections," ACM CCS '11, pp. 527-536, 2011.
- F. Maggi, A. Volpatto, S. Gasparini, G. Boracchi, and S. Zanero, "A fast eavesdropping attack against touchscreens," Information Assurance and Security (IAS 2011), pp. 320-325, 2011.
- H. Sasamoto, N.Christin, and E.Hayashi, "Undercover: authentication usable in front of prying eyes," CHI '08, pp. 183-192, 2008.
- T. Perkovic, M. Cagalj, and N. Rakic, "SSSL: shoulder surfing safe login," in Proceedings of the International Conference on Software, Telecommunication and Computer Networks 2009, pp. 270-275, 2009.
- A. De Luca, E. Von Zezschwitz, and H. HuBmann, "Vibrapass - secure authentication based on shared lies," CHI '09, pp. 913-916, 2009.
- A. Bianchi, I. Oakley, J. K. Lee, and D.-S. Kwon, "The haptic wheel: design and evaluation of a tactile password system," CHI '10, pp. 3625-3630, 2010.
- A. Bianchi, I. Oakley, V. Kostakos, and D.-S. Kwon, "The phone lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices," ACM TEI '11, pp. 197-200, 2011.
- A. Bianchi, I. Oakley, and D. S. Kwon, "Spinlock: A singlecue haptic and audio PIN input technique for authentication," in Haptic and Audio Interaction Design (HAID 2011), vol. 6851 of Lecture Notes in Computer Science, pp. 81-90, 2011.
- M.-K. Lee, H. Nam, and D. K. Kim, "Secure bimodal PIN-entry method using audio signals," Computers and Security, vol. 56, pp. 140-150, 2016. https://doi.org/10.1016/j.cose.2015.06.006
- A. Bianchi, I. Oakley, and D. S. Kwon, "Counting clicks and beeps: Exploring numerosity based haptic and audio PIN entry," Interacting with Computers, vol. 24, no. 5, pp. 409-422, 2012. https://doi.org/10.1016/j.intcom.2012.06.005
- M.-K. Lee, J. Yoo, H. Nam, "Analysis and Improvement on a Unimodal Haptic PIN-Entry Method," Mobile Information Systems, vol. 2017, Article ID 6047312, 17 pages, 2017.
- T. Perkovic, S. Li, A. Mumtaz, S. A. Khayam, Y. Javed, and M. Cagalj, "Breaking undercover: Exploiting design flaws and nonuniform human behavior," SOUPS '11, 2011.
- M. Cagalj, T. Perkovic, and M. Bugaric, "Timing attacks on cognitive authentication schemes," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 584-596, 2015. https://doi.org/10.1109/TIFS.2014.2376177
- Q. Yan, J. Han, Y. Li, and R. H. Deng, "On limitations of designing leakage-resilient password systems: attacks, principles and usability," NDSS '12, 2012.
- H. J. Asghar, S. Li, R. Steinfeld, and J. Pieprzyk, "Does counting still count? revisiting the security of counting based user authentication protocols against statistical attacks," NDSS '13, 2013.
- H. J. Asghar, R. Steinfeld, S. Li, M. A. Kaafar, and J. Pieprzyk, "On the linearization of human identification protocols: attacks based on linear algebra, coding theory, and lattices," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1643-1655, 2015. https://doi.org/10.1109/TIFS.2015.2421875
- T. Kwon and J. Hong, "Analysis and improvement of a PINEntry method resilient to shoulder-surfing and recording attacks," IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, article no. A6, pp. 278-292, 2015. https://doi.org/10.1109/TIFS.2014.2374352
- E. Hayashi, S. Das, S. Amini, J. Hong, and I. Oakley, "CASA: context-aware scalable authentication," SOUPS '13, pp. 3:1-3:10, 2013.
- J. Thorpe, P. C. van Oorschot, and A. Somayaji, "Pass-thoughts: authenticating with our minds," in Proceedings of the 2005 workshop on New security paradigms (NSPW '05), pp. 45-56, 2005.
- M. Kumar, T. Garfinkel, D. Boneh, and T.Winograd, "Reducing shoulder-surfing by using gaze-based password entry," SOUPS '07, pp. 13-19, 2007.
- M.-K. Lee and H. Nam, "Secure and fast PIN-entry method for 3D display," SECURWARE 2013, pp. 26-29, 2013.
- M.-K. Lee, J. B. Kim, and M. K. Franklin, "Enhancing the security of personal identification numbers with three-dimensional displays," Mobile Information Systems, vol. 2016, Article ID 8019830, 9 pages, 2016.
- D. K. Yadav, B. Ionascu, S. V. Krishna Ongole, A. Roy, and N. Memon, "Design and analysis of shoulder surfing resistant PIN based authentication mechanisms on Google Glass," in 1st Workshop on Wearable Security and Privacy (In Association with Financial Crypto 2015), 2015, paper 8.
- P. Lantz, B. Johansson, M. Hell, and B. Smeets, "Visual cryptography and obfuscation: a use-case for decrypting and deobfuscating information using augmented reality ," Financial cryptography and data security, vol. 8976 of Lecture Notes in Computer Science, pp. 261-273, 2015.
- D. Kim, P. Dunphy, P. Briggs et al., "Multi-touch authentication on tabletops," CHI 2010, pp. 1093-1102, 2010.
- Q. Yan, J. Han, Y. Li, J. Zhou, and R. H. Deng, "Designing leakage-resilient password entry on touchscreen mobile devices," ASIACCS '13, pp. 37-48, 2013.