Advertisement
Guest User

Untitled

a guest
Apr 28th, 2017
112
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.20 KB | None | 0 0
  1. [1] Abdullah, M.D.H. et al.: Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique. Presented at the May (2008).
  2.  
  3. [2] Andriotis, P. et al.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. pp. 1–6 ACM (2013).
  4.  
  5. [3] Andriotis, P. et al.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. pp. 1–6 ACM (2013).
  6.  
  7. [4] Andriotis, P. et al.: A study on usability and security features of the Android pattern lock screen. Information and Computer Security. 24, 1, 53–72 (2016).
  8.  
  9. [5] Aviv, A.J. et al.: Smudge Attacks on Smartphone Touch Screens. Woot. 10, 1–7 (2010).
  10.  
  11. [6] Colley, A. et al.: Extending the Touchscreen Pattern Lock Mechanism with Duplicated and Temporal Codes. Advances in Human-Computer Interaction. 2016, 1–11 (2016).
  12.  
  13. [7] Davis, D. et al.: On User Choice in Graphical Password Schemes. In: USENIX Security Symposium. pp. 11–11 (2004).
  14.  
  15. [8] Egelman, S. et al.: Are You Ready to Lock? Presented at the (2014).
  16.  
  17. [9] Kwon, T., Na, S.: TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems. Computers & Security. 42, 137–150 (2014).
  18.  
  19. [10] Oakley, I., Bianchi, A.: Multi-touch passwords for mobile device access. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing. pp. 611–612 ACM (2012).
  20.  
  21. [11] Tari, F. et al.: A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the second symposium on Usable privacy and security. pp. 56–66 ACM (2006).
  22.  
  23. [12] Uellenbeck, S. et al.: Quantifying the security of graphical passwords: the case of android unlock patterns. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. pp. 161–172 ACM (2013).
  24.  
  25. [13] Von Zezschwitz, E. et al.: Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. Presented at the (2013).
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement