Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516700
|View full text |Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

10
229
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 161 publications
(240 citation statements)
references
References 28 publications
10
229
0
1
Order By: Relevance
“…As an alternative to the vulnerable textual passwords, other schemes have been proposed, known as graphical passwords [4], given the fact that the human brain reacts better when it has to deal with visual and graphical information [14] [17]. The variety of graphical passwords makes them distinct.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As an alternative to the vulnerable textual passwords, other schemes have been proposed, known as graphical passwords [4], given the fact that the human brain reacts better when it has to deal with visual and graphical information [14] [17]. The variety of graphical passwords makes them distinct.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Aspects of its usability against security have been studied in [17]. In a relevant case study [3] researchers demonstrated the vulnerabilities of touchscreens and conducted attacks (known as smudge attacks) on graphical passwords using the residues that were left on the screen.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The circumstance that all the participants are studying in the UK and proficient in English could be a factor for the bias. Additionally, modifying the grid arrangements by [16] did not significantly improve things as users simply used the node to the right of top-left. In the dataset, there were 31 participants who were Europeans, 18 Asians, 50 Africans/Caribbean, 23 Middle Eastern and 3 Americans.…”
Section: Discussionmentioning
confidence: 99%
“…On Pattern Unlock, Uellenbeck et al [16] were of the first to study and quantify the strength of the authentication. They studied 584 participants patterns (by user study -user's patterns and pen and paper survey -statistical information of user's patterns), to which they used 2-grams and 3-grams to construct a Markov Process Model that generates likely patterns.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Andriotis et al [9,10] focused on human factors that might affect the choice of graphical passwords on a smartphone (such as sub-patterns and starting points), which in combination with smudge attacks can be used to infer the graphical passwords. Finally, in [23] the authors studied the effect of pattern layout on the strength of graphical passwords.…”
Section: Related Workmentioning
confidence: 99%