The use of authentication systems has increased significantly due to the advancement of technology, greater affordability of devices, increased ease of use, and enhanced functionality. These authentication systems help safeguard users’ private personal information. There are a plethora of authentication systems based on a variety of inputs such as pins, biometrics, and smart cards. All of these authentication systems experience different threats and attacks. Shoulder surfing is an attack when an intruder tries to look at what a user is inputting on the authentication system either by looking over the shoulder or using the video technology. Pin-based authentication systems are prone to shoulder surfing; e.g. at ATM’s or other public places a...
Identity manipulation is considered a serious security issue that has been enlarged with the spread ...
This paper presents a simple PIN-like approach to user authentication, using the gaze sequence of an...
This paper presents a simple PIN-like approach to user authentication, using the gaze sequence of an...
The use of authentication systems has increased significantly due to the advancement of technology, ...
Eye-gaze and mid-air gestures are promising for resisting various types of side-channel attacks duri...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of...
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety...
Personal identification numbers (PINs) are frequently used to verify the identity of a user and for ...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
To stop attackers from accessing protected contents of a website or a mobile application, authentica...
Authentication systems used in the security world vary greatly but one system, the textual password ...
Shoulder-surfing – using direct observation techniques, such as looking over someone's shoulder...
Identity manipulation is considered a serious security issue that has been enlarged with the spread ...
This paper presents a simple PIN-like approach to user authentication, using the gaze sequence of an...
This paper presents a simple PIN-like approach to user authentication, using the gaze sequence of an...
The use of authentication systems has increased significantly due to the advancement of technology, ...
Eye-gaze and mid-air gestures are promising for resisting various types of side-channel attacks duri...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of...
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety...
Personal identification numbers (PINs) are frequently used to verify the identity of a user and for ...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
To stop attackers from accessing protected contents of a website or a mobile application, authentica...
Authentication systems used in the security world vary greatly but one system, the textual password ...
Shoulder-surfing – using direct observation techniques, such as looking over someone's shoulder...
Identity manipulation is considered a serious security issue that has been enlarged with the spread ...
This paper presents a simple PIN-like approach to user authentication, using the gaze sequence of an...
This paper presents a simple PIN-like approach to user authentication, using the gaze sequence of an...