Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [1] Abdullah, M.D.H. et al.: Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique. Presented at the May (2008).
- [2] Andriotis, P. et al.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. pp. 1–6 ACM (2013).
- [3] Andriotis, P. et al.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. pp. 1–6 ACM (2013).
- [4] Andriotis, P. et al.: A study on usability and security features of the Android pattern lock screen. Information and Computer Security. 24, 1, 53–72 (2016).
- [5] Aviv, A.J. et al.: Smudge Attacks on Smartphone Touch Screens. Woot. 10, 1–7 (2010).
- [6] Colley, A. et al.: Extending the Touchscreen Pattern Lock Mechanism with Duplicated and Temporal Codes. Advances in Human-Computer Interaction. 2016, 1–11 (2016).
- [7] Davis, D. et al.: On User Choice in Graphical Password Schemes. In: USENIX Security Symposium. pp. 11–11 (2004).
- [8] Egelman, S. et al.: Are You Ready to Lock? Presented at the (2014).
- [9] Kwon, T., Na, S.: TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems. Computers & Security. 42, 137–150 (2014).
- [10] Oakley, I., Bianchi, A.: Multi-touch passwords for mobile device access. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing. pp. 611–612 ACM (2012).
- [11] Tari, F. et al.: A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the second symposium on Usable privacy and security. pp. 56–66 ACM (2006).
- [12] Uellenbeck, S. et al.: Quantifying the security of graphical passwords: the case of android unlock patterns. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. pp. 161–172 ACM (2013).
- [13] Von Zezschwitz, E. et al.: Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. Presented at the (2013).
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement