1 |
M. K. Lee, H. Nam, and D. K. Kim, "Secure bimodal pin-entry method using audio signals," Computers & Security, vol. 56, pp. 140-150, 2016.
DOI
|
2 |
A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, "The phone lock: audio and haptic shoulder-surfing resistant pin entry methods for mobile devices," in Proceedings of the 5th International Conference on Tangible, Embedded, and Embodied Interaction, Funchal, Portugal, pp. 197-200, 2011.
|
3 |
Q. Yue, Z. Ling, B. Liu, X. Fu, and W. Zhao, "Blind recognition of touched keys: attack and countermeasures," 2014 [Internet], Available: https://arxiv.org/abs/1403.4829.
|
4 |
H. Seo, Z. Liu, G. Seo, T. Park, J. Choi, and H. Kim, "Open sesame! Hacking the password," in Information Security Applications, Lecture Notes in Computer Science, vol. 9503, pp. 215-226, 2015.
|
5 |
Specification of the Samsung Galaxy Note5, 2016 [Internet], Available: http://www.gsmarena.com/samsung_galaxy_note5-7431.php.
|
6 |
V. Roth, K. Richter, and R. Freidinger, "A pin-entry method resilient against shoulder surfing," in Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, pp. 236-245, 2004.
|
7 |
A. Bianchi, I. Oakley, and D. S. Kwon, "Counting clicks and beeps: Exploring numerosity based haptic and audio pin entry," Interacting with Computers, vol. 24, no. 5, pp. 409-422, 2012.
DOI
|
8 |
Ivona Text-to-Speech, 2016 [Internet], Available: https://www. ivona.com.
|