2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2020
DOI: 10.1109/mass50613.2020.00084
|View full text |Cite
|
Sign up to set email alerts
|

Virtual Step PIN Pad: Towards Foot-input Authentication Using Geophones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 36 publications
0
1
0
Order By: Relevance
“…The PIN-entry method is widely adopted in systems and devices because of its simplicity, reliability, convenience, efficiency, and customer satisfaction. However, they are vulnerable to brute-force attacks, shoulder-surfing attacks, thermal tracking, PIN leakage, random guessing attacks, replay attacks, acoustics keyboard eavesdropping, social engineering attacks, spoofing attacks, smudge attacks, malware attacks, and are easily forged (Salman et al, 2019;Shang & Wu, 2020;He et al, 2020;Das et al, 2020;Ali et al, 2020a;Ali et al, 2020b;AbouSteit et al, 2020;Hari et al, 2021;Jain et al, 2021;Caporusso, 2021;Binbeshr et al, 2021).…”
Section: Personal Identification Number (Pin)mentioning
confidence: 99%
“…The PIN-entry method is widely adopted in systems and devices because of its simplicity, reliability, convenience, efficiency, and customer satisfaction. However, they are vulnerable to brute-force attacks, shoulder-surfing attacks, thermal tracking, PIN leakage, random guessing attacks, replay attacks, acoustics keyboard eavesdropping, social engineering attacks, spoofing attacks, smudge attacks, malware attacks, and are easily forged (Salman et al, 2019;Shang & Wu, 2020;He et al, 2020;Das et al, 2020;Ali et al, 2020a;Ali et al, 2020b;AbouSteit et al, 2020;Hari et al, 2021;Jain et al, 2021;Caporusso, 2021;Binbeshr et al, 2021).…”
Section: Personal Identification Number (Pin)mentioning
confidence: 99%
“…The PIN-entry method is widely adopted in systems and devices because of its simplicity, reliability, convenience, efficiency, and customer satisfaction. Likewise, they are resilient to brute-force attacks, shoulder-surfing attacks, thermal tracking, PIN leakage, random guessing attacks, replay attacks, acoustics keyboard eavesdropping, social engineering attacks, key logger, spoofing attacks, smudge attacks, malware attacks, and are easily forged (Salman et al, 2019;Shang & Wu, 2020;He et al, 2020;Das et al, 2020;AbouSteit et al, 2020;Zhang et al, 2021;Hari et al, 2021;Jain et al, 2021;Caporusso, 2021;Binbeshr et al, 2021).…”
Section: Pinmentioning
confidence: 99%