SSSL: Shoulder Surfing Safe Login
نویسندگان
چکیده
منابع مشابه
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully observes the entire input and output of a login procedure, (ii) the attacker only partially observes the input and output. Login methods secure in the fully observable model imply very long secrets and/or complex calculations. In...
متن کاملShoulder-Surfing Safe Login in a Partially Observable Attacker Model (Short Paper)
Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully observes the entire input and output of a login procedure, (ii) the attacker only partially observes the input and output. Login methods secure in the fully observable model imply very long secrets and/or complex calculations. In...
متن کاملProtecting the login session from camera based shoulder surfing attacks
...................................................................................................................................................... viii 1. Chapter 1 Problem Statement................................................................................................................1 2. Chapter 2 Background and Related Work............................................................
متن کاملPitfalls of Shoulder Surfing Studies
We review empirical studies that evaluate the resilience of various PIN entry methods against human shoulder surfers. Conducting such studies is challenging because adversaries are not available for study and must be simulated in one way or another. We were interested to find out whether there is a common standard how these experiments are designed and reported. In the course of our research we...
متن کاملGraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones
Today, smartphones are widely used and they already have a growing market share of more than 70% according to recent studies. These devices often contain sensitive data like contacts, pictures, or even passwords that can easily be accessed by an attacker if the phone is not locked. Since they are mobile and used as everyday gadgets, they are susceptible to get lost or stolen. Hence, access cont...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Communications Software and Systems
سال: 2010
ISSN: 1846-6079,1845-6421
DOI: 10.24138/jcomss.v6i2.191