1 |
V. Roth, K. Richter, and R. Freidinger, "A PIN-entry method resilient against shoulder surfing," Proceedings of ACM Conference Computer and Communications Security, pp. 236-245, 2004.
|
2 |
M. K. Lee, "Security notions and advanced method for human shoulder-surfing resistant PIN-entry," IEEE Transactions on Information Forensics and Security, vol. 9, no. 4, pp.695-708, Apr. 2014.
DOI
|
3 |
A. D. Luca, K. Hertzshuch, and H. Hussmann, "ColorPin-securing PIN Entry through indirect input," Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1103-1106, 2010.
|
4 |
G. E. Blonder, "Graphical passwords", United States Patent 5559961, 1996.
|
5 |
P. Dunphy, J. Nicholson and P. Olivier, "Securing passfaces for description," Proceedings of the 4th symposium on Usable privacy and security, pp. 24-35, Jul. 2008.
|
6 |
I. Jermyn, A. Mayer, F. Monrose, K. Reiter, and A. D. Rubin, "The design and analysis of graphical passwords," Proceedings of the 8th conference on USENIX Security Symposium, Aug. 1999.
|
7 |
H. Zhao and X. Li, "S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme," Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, May. 2007.
|
8 |
A. De Luca, E. V. Zezschwitz, N. D. H. Nguyen, M. Maurer, E. Rubegni, M. P. Scipioni, and M. Langheinrich, "Back-of-device authentication on smartphones," Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, May 2013.
|
9 |
J. Gugenheimer, A. De Luca, H. Hess, S. Karg, D. Wolf, and E. Rukzio, "Colorsnakes: Using colored decoys to secure authentication in sensitive contexts," Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, Aug. 2015.
|
10 |
A. Maiti, K. Crager, M. Jadliwala, J. He, K. Kwiat, and C. Kamhoua, "RandomPad: Usability of randomized mobile keypads for defeating inference attacks," Proceedings of the IEEE Euro S&P Workshop on Innovations in Mobile Privacy & Security, Jan. 2017
|
11 |
Q. Yan, J. Han, Y. Li, J. Zhou, and R. H Deng, "Designing leakage-resilient password entry on touchscreen mobile devices," Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp. 37-48, May 2013.
|
12 |
N. H. Zakaria, D. Griffiths, S. Brostoff, and J. Yan, "Shoulder surfing defence for recall-based graphical passwords," Proceedings of the Seventh Symposium on Usable Privacy and Security, Jul. 2011.
|
13 |
O. Wiese and V. Roth, "See you next time: a model for modern shoulder surfers," Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services, Sep. 2016.
|
14 |
B. Malek, M. Orozco, and A. El Saddik, "Novel shoulder-surfing resistant haptic-based graphical password," International Journal of Information Security, vol. 13, no. 3, pp. 245-254, Jun. 2014.
DOI
|
15 |
A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, "The phone lock: audio and hapticshoulder-surfing resistant PIN entry methods for mobile devices," Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, Jan. 2011.
|
16 |
A. De Luca, M. Harbach, E. V. Zezschwitz, M. Maurer, B. Ewald Slawik, H. Hussmann, and M. Smith, "Now you see me, now you don't: protecting smartphone authentication from shoulder surfers," Proceedings in 32nd Annual ACM Conference on Human Factors in Computing Systems, Toronto, CA, Apr. 2014.
|
17 |
M. Harbach, A. De Luca, and S. Egelman, "The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens," Proceedings of the 2016 CHI conference on Human Factors in Computing Systems, pp. 4806-4817, 2016.
|
18 |
M. Harbach, E. V. Zezschwitz, A. Fichtner, A. De Luca, and M. Smith, "It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception," Proceedings of 10th Symposium on Usable Privacy and Security, Menlo Park, CA, Jul. 2014.
|
19 |
A. S. Arif, A. Mazalek, and W. Stuerzlinger, "The use of pseudo pressure in authenticating smartphone users," Proceedings in 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, London, UK, Dec. 2014.
|
20 |
K. Krombholz, T. Hupperich, and T. Holz, "Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices," Proceedings in 12th Symposium on Usable Privacy and Security, Denver, CO, Jun. 2016.
|
21 |
J.-W. Kim, S.-H. Kim, S.-Y. Park, and H.-G. Cho, "Hangul Password System for Preventing Shoulder-Surfing," The Journal of the Korea Contents Association, vol. 11, no. 4, pp. 33-41, Apr. 2011.
DOI
|
22 |
M. Eiband, M. Khamis, E. V. Zezschwitz, H. Hussmann, and F. Alt, "Understanding shoulder surfing in the wild: Stories from users and observers," Proceedings in 35th Annual ACM Conference on Human Factors in Computing Systems, Denver CO. May 2017.
|
23 |
E. V. Zezschwitz, A. De Luca, B. Brunkow, and H. Hussmann, "SwiPIN: Fast and secure pin-entry on smartphones," Proceedings in 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Korea, Apr. 2015.
|