Proceedings of the Working Conference on Advanced Visual Interfaces - AVI '06 2006
DOI: 10.1145/1133265.1133303
|View full text |Cite
|
Sign up to set email alerts
|

Design and evaluation of a shoulder-surfing resistant graphical password scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

4
229
0
4

Year Published

2006
2006
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 280 publications
(242 citation statements)
references
References 12 publications
4
229
0
4
Order By: Relevance
“…Lock patterns are one type of recall-based graphical password [2]. They have been criticized because of their vulnerabilities to smudge attacks (i.e., recognizing the fingers' grease on the screen) [1], shoulder-surfing attacks [32] (i.e., observing or recording with a video camera the moment of authentication), and others. We hypothesize that adding biometric analysis to lock patterns can enhance the security of this type of graphical passwords by becoming a two-factor authentication mechanism.…”
Section: Fig 1 An Android Lock Patternmentioning
confidence: 99%
“…Lock patterns are one type of recall-based graphical password [2]. They have been criticized because of their vulnerabilities to smudge attacks (i.e., recognizing the fingers' grease on the screen) [1], shoulder-surfing attacks [32] (i.e., observing or recording with a video camera the moment of authentication), and others. We hypothesize that adding biometric analysis to lock patterns can enhance the security of this type of graphical passwords by becoming a two-factor authentication mechanism.…”
Section: Fig 1 An Android Lock Patternmentioning
confidence: 99%
“…In [26], users need to recognize pass-objects and click inside the convex hull formed by all of the pass-objects. If properly designed, this method can provide good security.…”
Section: Related Workmentioning
confidence: 99%
“…However, their inherent security and usability problems [6][7][8][9][10][11] led to the development of graphical passwords as an alternative. To date, there have been several graphical password schemes, such as [7,18,[20][21][22][23][24][25][26]. They have overcome some drawbacks of traditional password schemes, but most of the current graphical password schemes remain vulnerable to spyware attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to be authenticated, the user has to click any icon belonging to the convex-hull whose vertices are the pre-selected pass-icons. This scheme has been improved in [25].…”
Section: Related Workmentioning
confidence: 99%