To stop attackers from accessing protected contents of a website or a mobile application, authentication systems with various forms are presented. One of the challenging barriers in nowadays identification systems is unauthorized bystanders. This attack is mostly applicable on many sorts of authentication systems. To fight with unauthorized eyes, many approaches have been proposed. Each one has its own pros and cons. In this paper, the proposed system is a two-factor authentication in conjunction of smart-phone of owner. To disable malicious softwares to key log keystrokes or take screenshot or observers to memorize your hand movement on keyboard or mouse curse on a virtual keyboard, proposed system came up with a novel way to decrease the ...
We propose an authentication method against shoulder-surfing attacks using two kinds of channel, whi...
We propose an authentication method against shoulder-surfing attacks using two kinds of channel, whi...
Authentication based on passwords is used largely in applications for computer security and privacy....
Recently, mobile terminals such as smartphones have come to be widely used. Most of such mobile term...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Recently, mobile terminals such as smartphones have come into widespread use. Most of such mobile te...
The use of authentication systems has increased significantly due to the advancement of technology, ...
In our security-conscious society today, two factor authentication has been widely deployed for user...
In this paper author presents an approach to minimize shoulder surfing attack (SSA). Information ava...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
In order to prevent intruders from looking into sensitive data in smartphones users will have their ...
We propose a multimodal scheme, GazeTouchPass, that combines gaze and touch for shoulder-surfing res...
The use of untrusted computers to access critical information introduces one of the main challenges ...
Context. For a user to gain access to a protected resource on the web,the user needs to get authenti...
We propose an authentication method against shoulder-surfing attacks using two kinds of channel, whi...
We propose an authentication method against shoulder-surfing attacks using two kinds of channel, whi...
Authentication based on passwords is used largely in applications for computer security and privacy....
Recently, mobile terminals such as smartphones have come to be widely used. Most of such mobile term...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Recently, mobile terminals such as smartphones have come into widespread use. Most of such mobile te...
The use of authentication systems has increased significantly due to the advancement of technology, ...
In our security-conscious society today, two factor authentication has been widely deployed for user...
In this paper author presents an approach to minimize shoulder surfing attack (SSA). Information ava...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
In order to prevent intruders from looking into sensitive data in smartphones users will have their ...
We propose a multimodal scheme, GazeTouchPass, that combines gaze and touch for shoulder-surfing res...
The use of untrusted computers to access critical information introduces one of the main challenges ...
Context. For a user to gain access to a protected resource on the web,the user needs to get authenti...
We propose an authentication method against shoulder-surfing attacks using two kinds of channel, whi...
We propose an authentication method against shoulder-surfing attacks using two kinds of channel, whi...
Authentication based on passwords is used largely in applications for computer security and privacy....