SSSL: Shoulder Surfing Safe Login

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Shoulder-Surfing Safe Login in a Partially Observable Attacker Model

Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully observes the entire input and output of a login procedure, (ii) the attacker only partially observes the input and output. Login methods secure in the fully observable model imply very long secrets and/or complex calculations. In...

متن کامل

Shoulder-Surfing Safe Login in a Partially Observable Attacker Model (Short Paper)

Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully observes the entire input and output of a login procedure, (ii) the attacker only partially observes the input and output. Login methods secure in the fully observable model imply very long secrets and/or complex calculations. In...

متن کامل

Protecting the login session from camera based shoulder surfing attacks

...................................................................................................................................................... viii 1. Chapter 1 Problem Statement................................................................................................................1 2. Chapter 2 Background and Related Work............................................................

متن کامل

Pitfalls of Shoulder Surfing Studies

We review empirical studies that evaluate the resilience of various PIN entry methods against human shoulder surfers. Conducting such studies is challenging because adversaries are not available for study and must be simulated in one way or another. We were interested to find out whether there is a common standard how these experiments are designed and reported. In the course of our research we...

متن کامل

GraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones

Today, smartphones are widely used and they already have a growing market share of more than 70% according to recent studies. These devices often contain sensitive data like contacts, pictures, or even passwords that can easily be accessed by an attacker if the phone is not locked. Since they are mobile and used as everyday gadgets, they are susceptible to get lost or stolen. Hence, access cont...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Communications Software and Systems

سال: 2010

ISSN: 1846-6079,1845-6421

DOI: 10.24138/jcomss.v6i2.191