1 |
A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, "The phone lock: audio and haptic shoulder-surng resistant PIN entry methods for mobile devices," In Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, Funchal, pp. 197-200, 2011.
|
2 |
M. Lee, H. Nam, and D. Kim, "Secure bimodal PIN-entry method using audio signals," Computers & Security, vol. 56, pp. 140-150, Feb. 2016.
DOI
|
3 |
H. Seo and H. Kim, "Hidden Indicator Based PIN-Entry Method Using Audio Signals," Journal of information and communication convergence engineering, vol. 15, no. 2, pp. 91-96, June 2017.
DOI
|
4 |
H. Seo, Z. Liu, J. Kim, and H. Kim, "Personal identification number entry for Google glass," Computers & Electrical Engineering, vol. 63, pp.160-167, May 2017.
DOI
|
5 |
J. Ranjan and K. Whitehouse, "Automatic authentication of smartphone touch interactions using smartwatch," In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, Heidelberg, pp. 361-364, 2016.
|
6 |
H. Seo, Z. Liu, G. Seo, T. Park, J. Choi, and H. Kim, "Open sesame! hacking the password," In International Workshop on Information Security Applications, Jeju, pp. 215-226, 2015.
|
7 |
D. Buschek, F. Hartmann, E. Von Zezschwitz, A. De Luca, and F. Alt, "Snapapp: Reducing authentication overhead with a time-constrained fast unlock option," In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, pp. 3736-3747, 2016.
|
8 |
Y. Zhong, B. Bhargava, Y. Lu, P. Angin, "A Computational Dynamic Trust Model for User Authorization," Asia-pacific Journal of Convergent Research Interchange, HSST, vol. 1, no. 4, pp. 1-6, Dec. 2015.
|