2014
DOI: 10.1109/tifs.2014.2307671
|View full text |Cite
|
Sign up to set email alerts
|

Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-Entry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 61 publications
(31 citation statements)
references
References 23 publications
0
31
0
Order By: Relevance
“…the OA model (this attack is often also called a Shoulder Surfing Attack), several authentication methods are proposed in the literature. Lee proposed in [17] a method using n rounds for a code composed of n digits. The screen displays two horizontal arrays, one composed of digits on the other composed of symbols.…”
Section: B Related Workmentioning
confidence: 99%
“…the OA model (this attack is often also called a Shoulder Surfing Attack), several authentication methods are proposed in the literature. Lee proposed in [17] a method using n rounds for a code composed of n digits. The screen displays two horizontal arrays, one composed of digits on the other composed of symbols.…”
Section: B Related Workmentioning
confidence: 99%
“…Another issue with a nonstandard PIN is that it is not compatible with existing systems [8]. If the new PIN-entry method is supposed to be used for limited purposes, for example, to unlock a smartphone, defining a new PIN space such as in Timelock is not a problem.…”
Section: Reduction Of Pin Space Sizementioning
confidence: 99%
“…Recently, it was discovered that the binary method is actually vulnerable to well-trained human attackers, and PIN-entry methods that are more resistant to such attacks have been proposed [8,9]. The design goal of these methods as well as the binary method is to prevent an observation attack by a human observer who does not use a recording device, and thus such countermeasures are suitable for the few situations in which an attacker cannot use a recording device such as a phone camera [8].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations