We investigate improvements to authentication on mobile touchscreen phones and present a novel extension to the widely used touchscreen pattern lock mechanism. Our solution allows including nodes in the grid multiple times, which enhances the resilience to smudge and other forms of attack. For example, for a smudge pattern covering 7 nodes, our approach increases the amount of possible lock patterns by a factor of 15 times. Our concept was implemented and evaluated in a laboratory user test (n = 36). The test participants found the usability of the proposed concept to be equal to that of the baseline pattern lock mechanism but considered it more secure. Our solution is fully backwards-compatible with the current baseline pattern lock mechan...
A Project Report Submitted to the School of Science and Technology in Partial Fulfillment of the Req...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
An immense amount of private information is stored in smartphones. In order to secure information fr...
We investigate improvements to authentication on mobile touchscreen phones and present a novel exten...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
In this article, we present a new user authentication technique for touchscreen-based smartphone use...
Android unlock patterns are among the most common authentication mechanisms on mobile devices. They ...
20th IEEE Symposium on Computers and Communication (2015 : Larnaca; Cyprus)Android Lock Pattern is p...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
Pattern lock is widely used as a mechanism for authentication and authorization on Android devices. ...
Mobile devices, in the form of smartphones and tablet computers, are going through an amazing growth...
Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online se...
Pattern lock is widely used as a mechanism for authentication and authorization on Android devices. ...
In this master thesis, we propose a security improvement for traditional unlock patterns as found in...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
A Project Report Submitted to the School of Science and Technology in Partial Fulfillment of the Req...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
An immense amount of private information is stored in smartphones. In order to secure information fr...
We investigate improvements to authentication on mobile touchscreen phones and present a novel exten...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
In this article, we present a new user authentication technique for touchscreen-based smartphone use...
Android unlock patterns are among the most common authentication mechanisms on mobile devices. They ...
20th IEEE Symposium on Computers and Communication (2015 : Larnaca; Cyprus)Android Lock Pattern is p...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
Pattern lock is widely used as a mechanism for authentication and authorization on Android devices. ...
Mobile devices, in the form of smartphones and tablet computers, are going through an amazing growth...
Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online se...
Pattern lock is widely used as a mechanism for authentication and authorization on Android devices. ...
In this master thesis, we propose a security improvement for traditional unlock patterns as found in...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
A Project Report Submitted to the School of Science and Technology in Partial Fulfillment of the Req...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
An immense amount of private information is stored in smartphones. In order to secure information fr...