A systematic review of PIN-entry methods resistant to shoulder-surfing attacks
•First systematic review on PIN-entry methods resistant to shoulder-surfing attack.•A taxonomy of PIN-entry methods resistant to shoulder-surfing attack is presented.•Evaluation metrics, limitations, and recommendations of PIN methods are discussed.•PIN-entry methods are prone to recording-based sho...
Saved in:
Published in | Computers & security Vol. 101; p. 102116 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.02.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | •First systematic review on PIN-entry methods resistant to shoulder-surfing attack.•A taxonomy of PIN-entry methods resistant to shoulder-surfing attack is presented.•Evaluation metrics, limitations, and recommendations of PIN methods are discussed.•PIN-entry methods are prone to recording-based shoulder-surfing attack.•Error rate and PIN-entry time are widely adopted as criteria for usability.
Although conventional PIN-entry methods are widely used in many daily authentication procedures, they are highly susceptible to shoulder-surfing attacks. A plethora of PIN-entry methods have been proposed in the literature to mitigate such attacks. Unfortunately, none of these methods is capable of replacing the conventional PIN-entry method. This study presents the results of a systematic review of PIN-entry methods resistant to shoulder-surfing attacks so that the main challenges that impede their adoption can be provided along with opportunities for future research. A systematic search was conducted on seven databases using predefined criteria. A test–retest approach was performed by a single author to extract data. A total of 55 articles were included in this review. The review results manifest that PIN-entry methods are classified mainly into direct and indirect inputs. The user study was the standard research method, and error rate and PIN-entry time were the most frequently adopted usability measures. The review argues that a recording-based shoulder-surfing attack is a major threat to PIN-entry methods. Error rate and PIN-entry time are widely adopted criteria for usability. The review indicates that most PIN-entry methods require a high error rate and PIN-entry time than the conventional method. Moreover, the lack of a standard evaluation framework should be addressed. |
---|---|
AbstractList | •First systematic review on PIN-entry methods resistant to shoulder-surfing attack.•A taxonomy of PIN-entry methods resistant to shoulder-surfing attack is presented.•Evaluation metrics, limitations, and recommendations of PIN methods are discussed.•PIN-entry methods are prone to recording-based shoulder-surfing attack.•Error rate and PIN-entry time are widely adopted as criteria for usability.
Although conventional PIN-entry methods are widely used in many daily authentication procedures, they are highly susceptible to shoulder-surfing attacks. A plethora of PIN-entry methods have been proposed in the literature to mitigate such attacks. Unfortunately, none of these methods is capable of replacing the conventional PIN-entry method. This study presents the results of a systematic review of PIN-entry methods resistant to shoulder-surfing attacks so that the main challenges that impede their adoption can be provided along with opportunities for future research. A systematic search was conducted on seven databases using predefined criteria. A test–retest approach was performed by a single author to extract data. A total of 55 articles were included in this review. The review results manifest that PIN-entry methods are classified mainly into direct and indirect inputs. The user study was the standard research method, and error rate and PIN-entry time were the most frequently adopted usability measures. The review argues that a recording-based shoulder-surfing attack is a major threat to PIN-entry methods. Error rate and PIN-entry time are widely adopted criteria for usability. The review indicates that most PIN-entry methods require a high error rate and PIN-entry time than the conventional method. Moreover, the lack of a standard evaluation framework should be addressed. |
ArticleNumber | 102116 |
Author | Mat Kiah, M.L. Zaidan, A.A. Binbeshr, Farid Por, Lip Yee |
Author_xml | – sequence: 1 givenname: Farid surname: Binbeshr fullname: Binbeshr, Farid email: farid@hu.edu.ye organization: Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia – sequence: 2 givenname: M.L. surname: Mat Kiah fullname: Mat Kiah, M.L. email: misslaiha@um.edu.my organization: Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia – sequence: 3 givenname: Lip Yee surname: Por fullname: Por, Lip Yee email: porlip@um.edu.my organization: Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia – sequence: 4 givenname: A.A. surname: Zaidan fullname: Zaidan, A.A. email: aws.alaa@fskik.upsi.edu.my organization: Department of Computing, Sultan Idris University of Education (UPSI), Tanjong Malim, Malaysia |
BookMark | eNp9kM9OAjEQhxuDiYC-gKe-wGKnC21JvBDiHxKCHvTcdNupFGFr2qLh7d0Nnj1NMvP7JjPfiAza2CIht8AmwEDc7SY2ZpxwxvsGBxAXZAhK8kpwpgZk2IVkNWVTdUVGOe8YAymUGpLNguZTLngwJVia8DvgD42evq42FbYlnegByza63M1yyMW0hZZI8zYe9w5TlY_Jh_aDmlKM_czX5NKbfcabvzom748Pb8vnav3ytFou1pWtGSuVaGbKC1Mr7zwwL5E1MLNSQj1rhDUc5xbmIGaAopnzWnLnQIGspUOLTNX1mPDzXptizgm9_krhYNJJA9O9Eb3TvRHdG9FnIx10f4awu6x7NOlsA7YWXUhoi3Yx_If_Ar19bCI |
CitedBy_id | crossref_primary_10_3390_fi13120299 crossref_primary_10_3390_app14052045 crossref_primary_10_1109_ACCESS_2023_3243114 crossref_primary_10_3390_app131810040 crossref_primary_10_1016_j_cose_2022_103040 crossref_primary_10_1142_S021962202250050X crossref_primary_10_1007_s12652_021_03679_8 crossref_primary_10_1186_s12913_022_08235_4 crossref_primary_10_1016_j_sna_2024_115572 crossref_primary_10_3390_s23094441 crossref_primary_10_1016_j_cose_2024_103771 crossref_primary_10_1007_s11042_023_15227_x |
Cites_doi | 10.1109/TIFS.2014.2307671 10.1016/j.compeleceng.2017.05.006 10.1109/THMS.2015.2454498 10.12988/ces.2015.56164 10.1109/TSMC.2013.2270227 10.1016/j.cose.2018.05.012 10.1108/IJPCC-07-2014-0041 10.1002/nem.1998 10.1016/j.cose.2016.05.007 10.1109/TIFS.2014.2374352 10.1587/transinf.2015EDL8080 10.1016/j.cose.2017.01.008 10.1016/j.cose.2015.06.006 10.35940/ijeat.A1381.109119 10.1109/TIFS.2017.2725199 10.24138/jcomss.v6i2.191 10.1016/j.cose.2019.101647 10.7326/M14-2385 10.1109/ACCESS.2019.2937948 |
ContentType | Journal Article |
Copyright | 2020 Elsevier Ltd |
Copyright_xml | – notice: 2020 Elsevier Ltd |
DBID | AAYXX CITATION |
DOI | 10.1016/j.cose.2020.102116 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-6208 |
ExternalDocumentID | 10_1016_j_cose_2020_102116 S0167404820303898 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- AAXKI AAYXX AFJKZ AKRWK CITATION |
ID | FETCH-LOGICAL-c300t-6b58f6a38fdf10f7e0b15c77135b6ca2e9c191651e6b92372dd181737dece0833 |
IEDL.DBID | AIKHN |
ISSN | 0167-4048 |
IngestDate | Thu Sep 26 16:23:32 EDT 2024 Fri Feb 23 02:49:01 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Shoulder surfing Recording attack Observation attack PIN Authentication Password |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c300t-6b58f6a38fdf10f7e0b15c77135b6ca2e9c191651e6b92372dd181737dece0833 |
ParticipantIDs | crossref_primary_10_1016_j_cose_2020_102116 elsevier_sciencedirect_doi_10_1016_j_cose_2020_102116 |
PublicationCentury | 2000 |
PublicationDate | February 2021 2021-02-00 |
PublicationDateYYYYMMDD | 2021-02-01 |
PublicationDate_xml | – month: 02 year: 2021 text: February 2021 |
PublicationDecade | 2020 |
PublicationTitle | Computers & security |
PublicationYear | 2021 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Rajarajan, Kalita, Gayatri, Priyadarsini (bib0048) 2018 Breitinger, Tully-Doyle, Hassenfeldt (bib0005) 2020; 88 Higashiyama, Yanai, Okamura, Fujiwara (bib0014) 2015 Watanabe, Higuchi, Inami, Igarashi (bib0063) 2012 Uellenbeck, Hupperich, Wolf, Holz (bib0059) 2015 Van Nguyen, Sae-Bae, Memon (bib0060) 2017; 66 Lee, Nam, Kim (bib0040) 2016; 56 Leftheriotis (bib0041) 2013 Seo, Kim (bib0051) 2017; 15 Sugumar, Soundararajan (bib0057) 2017 Alsuhibany, Almutairi (bib0003) 2016; 14 Takada, Kokubun (bib0058) 2014 Kwon, Na (bib0033) 2015; 46 Jeon, I.-S., Yoon, E.-J., 2015. A simple pin input technique resisting shoulder surfing and smudge attacks. Shen, Yu, Xu, Yang, Guan (bib0053) 2016; 61 Almoctar, Irani, Peysakhovich, Hurter (bib0002) 2018 Ibrahim, Ambreen (bib0020) 2019; 9 Kumar, Akbari, Menges, MacKenzie, Staab (bib0030) 2019 Perković, Čagalj, Saxena (bib0047) 2010 Ku, Xu (bib0029) 2019 Nandhini, Jayanthy (bib0043) 2019 Still, Bell (bib0056) 2018; 40 Chakraborty, Li, Mondal, Chen, Pan (bib0009) 2019; 7 Kim, Sharma, Cardenas, Prabakar, Iyengar (bib0026) 2017 Critical Appraisal Skills Programme (2018). CASP (Qualitative) Checklist. [online] Available at Souza, Cunha, B Oliveira (bib0055) 2018; 28 Yadav, Ionascu, Ongole, Roy, Memon (bib0066) 2015 Kwon, Na (bib0032) 2014 Lee, Kim, Fukumoto, Lee (bib0035) 2017 Lee, Nam (bib0036) 2013 Guerar, Migliardi, Palmieri, Verderame, Merlo (bib0012) 2019 Holland, Morelli (bib0017) 2018 Hirakawa, Kogure, Ohzeki (bib0015) 2015; 3 Khamis, Hassib, Zezschwitz, Bulling, Alt (bib0025) 2017 Vijai, Kottayam, Joseph (bib0061) 2018; 4 Nyang, Kim, Lee, Kang, Cho, Lee, Mohaisen (bib0044) 2018; 78 Lee, Nam (bib0039) 2013 Lee, Kim, Franklin (bib0038) 2016; 2016 Chakraborty, Anand, Randhawa, Mondal (bib0008) 2016 Gugenheimer, De Luca, Hess, Karg, Wolf, Rukzio (bib0013) 2015 Kwon, Shin, Na (bib0034) 2014; 44 Von Zezschwitz, De Luca, Brunkow, Hussmann (bib0062) 2015 Carneiro, Elmadjian, Gonzales, Coutinho, Morimoto (bib0006) 2019 Li, Wu, Liu, Hu, Qin, Wu (bib0042) 2017 Roth, Richter, Freidinger (bib0049) 2004 Greene, Franklin, Greene, Kelsey (bib0011) 2016 Xu, Ku, Dan (bib0065) 2016 Papadopoulos, Nguyen, Durmus, Memon (bib0045) 2017; 12 Accessed: 2019-09-30. Keele (bib0024) 2007 Hopper, Blum (bib0018) 2001 Kabir, Hasan, Tahmid, Ovi, Rozario (bib0022) 2020 Seetharama, Paelke, Röcker (bib0050) 2015 Adithya, Aishwarya, Megalai, Priyadharshini, Kurinjimalar (bib0001) 2017 Shi, Zhu, Youssef (bib0054) 2009 Kwon, Hong (bib0031) 2015; 2 Lee (bib0037) 2014; 9 Aris, Yaakob (bib0004) 2018 Hirakawa, Kurihara, Ohzeki (bib0016) 2017 Dan, Ku (bib0010) 2017 Perković, Čagalj, Rakić (bib0046) 2010; 6 Ku, Cheng, Yeh, Chang (bib0028) 2016; 99 Seo, Kim, Kim, Liu (bib0052) 2017; 63 Kasat, Bhadade (bib0023) 2018 Krombholz, Hupperich, Holz (bib0027) 2016 Weaver, Mock, Hoanca (bib0064) 2011 Hutton, Salanti, Caldwell, Chaimani, Schmid, Cameron, Ioannidis, Straus, Thorlund, Jansen (bib0019) 2015; 162 Lee (10.1016/j.cose.2020.102116_bib0039) 2013 Rajarajan (10.1016/j.cose.2020.102116_bib0048) 2018 Keele (10.1016/j.cose.2020.102116_bib0024) 2007 Khamis (10.1016/j.cose.2020.102116_bib0025) 2017 Lee (10.1016/j.cose.2020.102116_bib0037) 2014; 9 Still (10.1016/j.cose.2020.102116_bib0056) 2018; 40 Lee (10.1016/j.cose.2020.102116_bib0036) 2013 Shi (10.1016/j.cose.2020.102116_bib0054) 2009 Dan (10.1016/j.cose.2020.102116_bib0010) 2017 Guerar (10.1016/j.cose.2020.102116_bib0012) 2019 Hutton (10.1016/j.cose.2020.102116_bib0019) 2015; 162 Kwon (10.1016/j.cose.2020.102116_bib0031) 2015; 2 Xu (10.1016/j.cose.2020.102116_bib0065) 2016 Lee (10.1016/j.cose.2020.102116_bib0035) 2017 Almoctar (10.1016/j.cose.2020.102116_bib0002) 2018 Takada (10.1016/j.cose.2020.102116_bib0058) 2014 Kim (10.1016/j.cose.2020.102116_bib0026) 2017 Roth (10.1016/j.cose.2020.102116_bib0049) 2004 Watanabe (10.1016/j.cose.2020.102116_bib0063) 2012 Kasat (10.1016/j.cose.2020.102116_bib0023) 2018 Gugenheimer (10.1016/j.cose.2020.102116_bib0013) 2015 Perković (10.1016/j.cose.2020.102116_bib0046) 2010; 6 Breitinger (10.1016/j.cose.2020.102116_bib0005) 2020; 88 Seo (10.1016/j.cose.2020.102116_bib0052) 2017; 63 10.1016/j.cose.2020.102116_bib0007 Kabir (10.1016/j.cose.2020.102116_bib0022) 2020 Uellenbeck (10.1016/j.cose.2020.102116_bib0059) 2015 Hopper (10.1016/j.cose.2020.102116_bib0018) 2001 Li (10.1016/j.cose.2020.102116_bib0042) 2017 Kwon (10.1016/j.cose.2020.102116_bib0034) 2014; 44 Lee (10.1016/j.cose.2020.102116_bib0038) 2016; 2016 Von Zezschwitz (10.1016/j.cose.2020.102116_bib0062) 2015 Hirakawa (10.1016/j.cose.2020.102116_bib0015) 2015; 3 Kumar (10.1016/j.cose.2020.102116_bib0030) 2019 Leftheriotis (10.1016/j.cose.2020.102116_bib0041) 2013 Carneiro (10.1016/j.cose.2020.102116_bib0006) 2019 Chakraborty (10.1016/j.cose.2020.102116_bib0008) 2016 Nandhini (10.1016/j.cose.2020.102116_bib0043) 2019 Yadav (10.1016/j.cose.2020.102116_bib0066) 2015 Weaver (10.1016/j.cose.2020.102116_bib0064) 2011 Hirakawa (10.1016/j.cose.2020.102116_bib0016) 2017 Nyang (10.1016/j.cose.2020.102116_bib0044) 2018; 78 Kwon (10.1016/j.cose.2020.102116_bib0033) 2015; 46 Alsuhibany (10.1016/j.cose.2020.102116_bib0003) 2016; 14 Vijai (10.1016/j.cose.2020.102116_bib0061) 2018; 4 Lee (10.1016/j.cose.2020.102116_bib0040) 2016; 56 Ku (10.1016/j.cose.2020.102116_bib0029) 2019 Kwon (10.1016/j.cose.2020.102116_bib0032) 2014 Papadopoulos (10.1016/j.cose.2020.102116_bib0045) 2017; 12 Ibrahim (10.1016/j.cose.2020.102116_bib0020) 2019; 9 Adithya (10.1016/j.cose.2020.102116_bib0001) 2017 Greene (10.1016/j.cose.2020.102116_bib0011) 2016 Souza (10.1016/j.cose.2020.102116_bib0055) 2018; 28 Chakraborty (10.1016/j.cose.2020.102116_bib0009) 2019; 7 Higashiyama (10.1016/j.cose.2020.102116_bib0014) 2015 Aris (10.1016/j.cose.2020.102116_bib0004) 2018 Van Nguyen (10.1016/j.cose.2020.102116_bib0060) 2017; 66 Sugumar (10.1016/j.cose.2020.102116_bib0057) 2017 10.1016/j.cose.2020.102116_bib0021 Ku (10.1016/j.cose.2020.102116_bib0028) 2016; 99 Shen (10.1016/j.cose.2020.102116_bib0053) 2016; 61 Holland (10.1016/j.cose.2020.102116_bib0017) 2018 Perković (10.1016/j.cose.2020.102116_bib0047) 2010 Seo (10.1016/j.cose.2020.102116_bib0051) 2017; 15 Krombholz (10.1016/j.cose.2020.102116_bib0027) 2016 Seetharama (10.1016/j.cose.2020.102116_bib0050) 2015 |
References_xml | – volume: 162 start-page: 777 year: 2015 end-page: 784 ident: bib0019 article-title: The prisma extension statement for reporting of systematic reviews incorporating network meta-analyses of health care interventions: checklist and explanations publication-title: Ann. Internal Med. contributor: fullname: Jansen – volume: 15 start-page: 91 year: 2017 end-page: 96 ident: bib0051 article-title: Hidden indicator based pin-entry method using audio signals publication-title: J. Inform. Commun. Converg. Eng. contributor: fullname: Kim – start-page: 1725 year: 2013 end-page: 1730 ident: bib0041 article-title: User authentication in a multi-touch surface: a chord password system publication-title: CHI’13 Extended Abstracts on Human Factors in Computing Systems contributor: fullname: Leftheriotis – volume: 12 start-page: 2875 year: 2017 end-page: 2889 ident: bib0045 article-title: Illusionpin: Shoulder-surfing resistant authentication using hybrid images publication-title: IEEE Trans. Inform. Forens. Secur. contributor: fullname: Memon – start-page: 89 year: 2015 end-page: 95 ident: bib0014 article-title: Revisiting authentication with shoulder-surfing resistance for smartphones publication-title: 2015 Third International Symposium on Computing and Networking (CANDAR) contributor: fullname: Fujiwara – volume: 28 start-page: e1998 year: 2018 ident: bib0055 article-title: Nomadikey: user authentication for smart devices based on nomadic keys publication-title: Int. J. Netw. Manag. contributor: fullname: B Oliveira – volume: 14 start-page: 328 year: 2016 ident: bib0003 article-title: Making pin and password entry secure against shoulder surfing using camouflage characters publication-title: Int. J. Comput. Sci. Inform. Secur. contributor: fullname: Almutairi – start-page: 351 year: 2017 end-page: 364 ident: bib0035 article-title: Reflector: Distance-independent, private pointing on a reflective screen publication-title: Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology contributor: fullname: Lee – volume: 40 start-page: 1 year: 2018 end-page: 8 ident: bib0056 article-title: Incognito: Shoulder-surfing resistant selection method publication-title: J. inform. Secur. Applica. contributor: fullname: Bell – start-page: 274 year: 2015 end-page: 283 ident: bib0013 article-title: Colorsnakes: using colored decoys to secure authentication in sensitive contexts publication-title: Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services contributor: fullname: Rukzio – start-page: 1144 year: 2017 end-page: 1148 ident: bib0016 article-title: Borderless interface for user authentication method tolerant against multiple video-recording attacks publication-title: 2017 International Conference on Computer Systems, Electronics and Control (ICCSEC) contributor: fullname: Ohzeki – volume: 2 start-page: 278 year: 2015 end-page: 292 ident: bib0031 article-title: Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks publication-title: IEEE Trans. Inform. Forens. Secur. contributor: fullname: Hong – start-page: 52 year: 2001 end-page: 66 ident: bib0018 article-title: Secure human identification protocols publication-title: International conference on the theory and application of cryptology and information security contributor: fullname: Blum – start-page: 1410 year: 2017 end-page: 1413 ident: bib0010 article-title: A simple observation attacks resistant pin-entry scheme employing audios publication-title: 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN) contributor: fullname: Ku – volume: 78 start-page: 1 year: 2018 end-page: 15 ident: bib0044 article-title: Two-thumbs-up: Physical protection for pin entry secure against recording attacks publication-title: Comput. Secur. contributor: fullname: Mohaisen – start-page: 1 year: 2012 end-page: 2 ident: bib0063 article-title: Cursorcamouflage: multiple dummy cursors as a defense against shoulder surfing publication-title: SIGGRAPH Asia 2012 Emerging Technologies contributor: fullname: Igarashi – start-page: 446 year: 2017 end-page: 450 ident: bib0025 article-title: Gazetouchpin: protecting sensitive data on mobile devices using secure multimodal authentication publication-title: Proceedings of the 19th ACM International Conference on Multimodal Interaction contributor: fullname: Alt – start-page: 1403 year: 2015 end-page: 1406 ident: bib0062 article-title: Swipin: fast and secure pin-entry on smartphones publication-title: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems contributor: fullname: Hussmann – volume: 46 start-page: 143 year: 2015 end-page: 150 ident: bib0033 article-title: Steganopin: two-faced human–machine interface for practical enforcement of pin entry security publication-title: IEEE Trans. Human-Mach. Syst. contributor: fullname: Na – start-page: 237 year: 2015 end-page: 253 ident: bib0059 article-title: Tactile one-time pad: Leakage-resilient authentication for smartphones publication-title: International Conference on Financial Cryptography and Data Security contributor: fullname: Holz – year: 2007 ident: bib0024 article-title: Guidelines for performing systematic literature reviews in software engineering publication-title: Technical Report contributor: fullname: Keele – start-page: 1 year: 2009 end-page: 7 ident: bib0054 article-title: A rotary pin entry scheme resilient to shoulder-surfing publication-title: 2009 International Conference for Internet Technology and Secured Transactions,(ICITST) contributor: fullname: Youssef – year: 2016 ident: bib0011 article-title: Measuring the Usability and Security of Permuted Passwords on Mobile Platforms contributor: fullname: Kelsey – volume: 3 start-page: 356 year: 2015 end-page: 360 ident: bib0015 article-title: A password authentication method tolerant to video-recording attacks analyzing multiple authentication operations publication-title: Int. J. Comput. Sci. Electron. Eng. (IJCSEE) contributor: fullname: Ohzeki – volume: 56 start-page: 140 year: 2016 end-page: 150 ident: bib0040 article-title: Secure bimodal pin-entry method using audio signals publication-title: Comput. Secur. contributor: fullname: Kim – volume: 4 start-page: 544 year: 2018 end-page: 549 ident: bib0061 article-title: An efficient security key for practical requirement of pin entry protection section authentication publication-title: Int. J. Adv. Res. Ideas Innov. Technol. contributor: fullname: Joseph – start-page: 435 year: 2017 end-page: 453 ident: bib0042 article-title: Eyesec: a practical shoulder-surfing resistant gaze-based authentication system publication-title: International Conference on Information Security Practice and Experience contributor: fullname: Wu – start-page: 1 year: 2017 end-page: 5 ident: bib0001 article-title: Security enhancement in automated teller machine publication-title: 2017 International Conference on Intelligent Computing and Control (I2C2) contributor: fullname: Kurinjimalar – volume: 63 start-page: 160 year: 2017 end-page: 167 ident: bib0052 article-title: Personal identification number entry for google glass publication-title: Comput. Electr. Eng. contributor: fullname: Liu – volume: 66 start-page: 115 year: 2017 end-page: 128 ident: bib0060 article-title: Draw-a-pin: authentication using finger-drawn pin on touch devices publication-title: Comput. Secur. contributor: fullname: Memon – start-page: 7 year: 2018 end-page: 14 ident: bib0004 article-title: Shoulder surf resistant screen locking for smartphones: a review of fifty non-biometric methods publication-title: 2018 IEEE Conference on Application, Information and Network Security (AINS) contributor: fullname: Yaakob – start-page: 745 year: 2013 end-page: 748 ident: bib0039 article-title: Secure and usable pin-entry method with shoulder-surfing resistance publication-title: International Conference on Human-Computer Interaction contributor: fullname: Nam – start-page: 351 year: 2010 end-page: 358 ident: bib0047 article-title: Shoulder-surfing safe login in a partially observable attacker model publication-title: International Conference on Financial Cryptography and Data Security contributor: fullname: Saxena – start-page: 80 year: 2017 end-page: 84 ident: bib0057 article-title: Cursor masquerade: Masking of authentic cursor using random numeric keypad and spurious cursors publication-title: 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) contributor: fullname: Soundararajan – start-page: 26 year: 2013 end-page: 29 ident: bib0036 article-title: Secure and fast pin-entry method for 3d display publication-title: Proceed. Securware contributor: fullname: Nam – start-page: 1875 year: 2016 end-page: 1881 ident: bib0008 article-title: On designing leakage-resilient vibration based authentication techniques publication-title: 2016 IEEE Trustcom/BigDataSE/ISPA contributor: fullname: Mondal – start-page: 1 year: 2018 end-page: 5 ident: bib0023 article-title: Revolving flywheel pin entry method to prevent shoulder surfing attacks publication-title: 2018 3rd International Conference for Convergence in Technology (I2CT) contributor: fullname: Bhadade – volume: 7 start-page: 124366 year: 2019 end-page: 124378 ident: bib0009 article-title: On overcoming the identified limitations of a usable pin entry method publication-title: IEEE Access contributor: fullname: Pan – volume: 2016 year: 2016 ident: bib0038 article-title: Enhancing the security of personal identification numbers with three-dimensional displays publication-title: Mob. Inform. Syst. contributor: fullname: Franklin – start-page: 59 year: 2016 end-page: 64 ident: bib0065 article-title: An observation attacks resistant pin-entry scheme using localized haptic feedback publication-title: 2016 IEEE Region 10 Symposium (TENSYMP) contributor: fullname: Dan – start-page: 281 year: 2015 end-page: 297 ident: bib0066 article-title: Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass publication-title: International conference on financial cryptography and data security contributor: fullname: Memon – start-page: 151 year: 2019 end-page: 156 ident: bib0029 article-title: Efficient shoulder surfing resistant pin authentication scheme based on localized tactile feedback publication-title: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) contributor: fullname: Xu – start-page: 226 year: 2019 end-page: 233 ident: bib0006 article-title: Pursuitpass: A visual pursuit-based user authentication system publication-title: 2019 32nd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI) contributor: fullname: Morimoto – start-page: 68 year: 2017 end-page: 73 ident: bib0026 article-title: Dynamicpin: A novel approach towards secure atm authentication publication-title: 2017 International Conference on Computational Science and Computational Intelligence (CSCI) contributor: fullname: Iyengar – start-page: 453 year: 2019 end-page: 467 ident: bib0043 article-title: Mobile communication based security for atm pin entry publication-title: International Conference on Computer Networks and Communication Technologies contributor: fullname: Jayanthy – start-page: 426 year: 2015 end-page: 435 ident: bib0050 article-title: Safetypin: Secure pin entry through eye tracking publication-title: International Conference on Human Aspects of Information Security, Privacy, and Trust contributor: fullname: Röcker – volume: 9 start-page: 777 year: 2019 end-page: 781 ident: bib0020 article-title: Gaze touch cross pin: Secure multimodal authentication using gaze and touch pin publication-title: Int. J. Eng. Adv. Technol. (IJEAT) contributor: fullname: Ambreen – volume: 99 start-page: 529 year: 2016 end-page: 532 ident: bib0028 article-title: A simple sector-based textual-graphical password scheme with resistance to login-recording attacks publication-title: IEICE Trans. Inform. Syst. contributor: fullname: Chang – start-page: 53 year: 2018 end-page: 59 ident: bib0048 article-title: Spinpad: A secured pin number based user authentication scheme publication-title: 2018 International Conference on Recent Trends in Advance Computing (ICRTAC) contributor: fullname: Priyadarsini – volume: 44 start-page: 716 year: 2014 end-page: 727 ident: bib0034 article-title: Covert attentional shoulder surfing: human adversaries are more powerful than expected publication-title: IEEE Trans. Syst. Man Cybernet. contributor: fullname: Na – volume: 88 start-page: 101647 year: 2020 ident: bib0005 article-title: A survey on smartphone user’s security choices, awareness and education publication-title: Comput. Secur. contributor: fullname: Hassenfeldt – start-page: 23 year: 2014 end-page: 24 ident: bib0032 article-title: Switchpin: Securing smartphone pin entry with switchable keypads publication-title: 2014 IEEE International Conference on Consumer Electronics (ICCE) contributor: fullname: Na – start-page: 207 year: 2016 end-page: 219 ident: bib0027 article-title: Use the force: Evaluating force-sensitive authentication for mobile devices publication-title: Twelfth Symposium on Usable Privacy and Security ( contributor: fullname: Holz – start-page: 329 year: 2019 end-page: 338 ident: bib0030 article-title: Touchgazepath: multimodal interaction with touch and gaze path for secure yet efficient pin entry publication-title: 2019 International Conference on Multimodal Interaction contributor: fullname: Staab – start-page: 1 year: 2020 end-page: 7 ident: bib0022 article-title: Enhancing smartphone lock security using vibration enabled randomly positioned numbers publication-title: Proceedings of the International Conference on Computing Advancements contributor: fullname: Rozario – start-page: 102 year: 2018 end-page: 111 ident: bib0017 article-title: Dynamic keypad–digit shuffling for secure pin entry in a virtual world publication-title: International Conference on Virtual, Augmented and Mixed Reality contributor: fullname: Morelli – start-page: e5549 year: 2019 ident: bib0012 article-title: Securing pin-based authentication in smartwatches with just two gestures publication-title: Concurr. Comput. contributor: fullname: Merlo – volume: 6 start-page: 65 year: 2010 end-page: 73 ident: bib0046 article-title: SSSL: shoulder surfing safe login publication-title: J. Comm. Software contributor: fullname: Rakić – start-page: 236 year: 2004 end-page: 245 ident: bib0049 article-title: A pin-entry method resilient against shoulder surfing publication-title: Proceedings of the 11th ACM conference on Computer and communications security contributor: fullname: Freidinger – volume: 9 start-page: 695 year: 2014 end-page: 708 ident: bib0037 article-title: Security notions and advanced method for human shoulder-surfing resistant pin-entry publication-title: IEEE Trans. Inform. Forens. Secur. contributor: fullname: Lee – volume: 61 start-page: 130 year: 2016 end-page: 141 ident: bib0053 article-title: User practice in password security: An empirical study of real-life passwords in the wild publication-title: Comput. Secur. contributor: fullname: Guan – start-page: 268 year: 2018 end-page: 277 ident: bib0002 article-title: Path word: a multimodal password entry method for ad-hoc authentication based on digits’ shape and smooth pursuit eye movements publication-title: Proceedings of the 20th ACM International Conference on Multimodal Interaction contributor: fullname: Hurter – start-page: 2749 year: 2011 end-page: 2754 ident: bib0064 article-title: Gaze-based password authentication through automatic clustering of gaze points publication-title: 2011 IEEE International Conference on Systems, Man, and Cybernetics contributor: fullname: Hoanca – year: 2014 ident: bib0058 article-title: Mtapin: multi-touch key input enhances security of pin authentication while keeping usability publication-title: Int. J. Pervas. Comput. Commun. contributor: fullname: Kokubun – start-page: 446 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0025 article-title: Gazetouchpin: protecting sensitive data on mobile devices using secure multimodal authentication contributor: fullname: Khamis – volume: 9 start-page: 695 issue: 4 year: 2014 ident: 10.1016/j.cose.2020.102116_bib0037 article-title: Security notions and advanced method for human shoulder-surfing resistant pin-entry publication-title: IEEE Trans. Inform. Forens. Secur. doi: 10.1109/TIFS.2014.2307671 contributor: fullname: Lee – volume: 63 start-page: 160 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0052 article-title: Personal identification number entry for google glass publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2017.05.006 contributor: fullname: Seo – volume: 46 start-page: 143 issue: 1 year: 2015 ident: 10.1016/j.cose.2020.102116_bib0033 article-title: Steganopin: two-faced human–machine interface for practical enforcement of pin entry security publication-title: IEEE Trans. Human-Mach. Syst. doi: 10.1109/THMS.2015.2454498 contributor: fullname: Kwon – start-page: 7 year: 2018 ident: 10.1016/j.cose.2020.102116_bib0004 article-title: Shoulder surf resistant screen locking for smartphones: a review of fifty non-biometric methods contributor: fullname: Aris – start-page: 274 year: 2015 ident: 10.1016/j.cose.2020.102116_bib0013 article-title: Colorsnakes: using colored decoys to secure authentication in sensitive contexts contributor: fullname: Gugenheimer – ident: 10.1016/j.cose.2020.102116_bib0021 doi: 10.12988/ces.2015.56164 – start-page: 453 year: 2019 ident: 10.1016/j.cose.2020.102116_bib0043 article-title: Mobile communication based security for atm pin entry contributor: fullname: Nandhini – volume: 44 start-page: 716 issue: 6 year: 2014 ident: 10.1016/j.cose.2020.102116_bib0034 article-title: Covert attentional shoulder surfing: human adversaries are more powerful than expected publication-title: IEEE Trans. Syst. Man Cybernet. doi: 10.1109/TSMC.2013.2270227 contributor: fullname: Kwon – start-page: 351 year: 2010 ident: 10.1016/j.cose.2020.102116_bib0047 article-title: Shoulder-surfing safe login in a partially observable attacker model contributor: fullname: Perković – year: 2016 ident: 10.1016/j.cose.2020.102116_bib0011 contributor: fullname: Greene – year: 2007 ident: 10.1016/j.cose.2020.102116_bib0024 article-title: Guidelines for performing systematic literature reviews in software engineering contributor: fullname: Keele – start-page: 226 year: 2019 ident: 10.1016/j.cose.2020.102116_bib0006 article-title: Pursuitpass: A visual pursuit-based user authentication system contributor: fullname: Carneiro – volume: 15 start-page: 91 issue: 2 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0051 article-title: Hidden indicator based pin-entry method using audio signals publication-title: J. Inform. Commun. Converg. Eng. contributor: fullname: Seo – volume: 78 start-page: 1 year: 2018 ident: 10.1016/j.cose.2020.102116_bib0044 article-title: Two-thumbs-up: Physical protection for pin entry secure against recording attacks publication-title: Comput. Secur. doi: 10.1016/j.cose.2018.05.012 contributor: fullname: Nyang – start-page: 23 year: 2014 ident: 10.1016/j.cose.2020.102116_bib0032 article-title: Switchpin: Securing smartphone pin entry with switchable keypads contributor: fullname: Kwon – volume: 14 start-page: 328 issue: 7 year: 2016 ident: 10.1016/j.cose.2020.102116_bib0003 article-title: Making pin and password entry secure against shoulder surfing using camouflage characters publication-title: Int. J. Comput. Sci. Inform. Secur. contributor: fullname: Alsuhibany – year: 2014 ident: 10.1016/j.cose.2020.102116_bib0058 article-title: Mtapin: multi-touch key input enhances security of pin authentication while keeping usability publication-title: Int. J. Pervas. Comput. Commun. doi: 10.1108/IJPCC-07-2014-0041 contributor: fullname: Takada – ident: 10.1016/j.cose.2020.102116_bib0007 – volume: 28 start-page: e1998 issue: 1 year: 2018 ident: 10.1016/j.cose.2020.102116_bib0055 article-title: Nomadikey: user authentication for smart devices based on nomadic keys publication-title: Int. J. Netw. Manag. doi: 10.1002/nem.1998 contributor: fullname: Souza – start-page: 52 year: 2001 ident: 10.1016/j.cose.2020.102116_bib0018 article-title: Secure human identification protocols contributor: fullname: Hopper – volume: 61 start-page: 130 year: 2016 ident: 10.1016/j.cose.2020.102116_bib0053 article-title: User practice in password security: An empirical study of real-life passwords in the wild publication-title: Comput. Secur. doi: 10.1016/j.cose.2016.05.007 contributor: fullname: Shen – start-page: 68 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0026 article-title: Dynamicpin: A novel approach towards secure atm authentication contributor: fullname: Kim – start-page: 435 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0042 article-title: Eyesec: a practical shoulder-surfing resistant gaze-based authentication system contributor: fullname: Li – volume: 2 start-page: 278 issue: 10 year: 2015 ident: 10.1016/j.cose.2020.102116_bib0031 article-title: Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks publication-title: IEEE Trans. Inform. Forens. Secur. doi: 10.1109/TIFS.2014.2374352 contributor: fullname: Kwon – start-page: 1144 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0016 article-title: Borderless interface for user authentication method tolerant against multiple video-recording attacks contributor: fullname: Hirakawa – start-page: 1 year: 2018 ident: 10.1016/j.cose.2020.102116_bib0023 article-title: Revolving flywheel pin entry method to prevent shoulder surfing attacks contributor: fullname: Kasat – volume: 99 start-page: 529 issue: 2 year: 2016 ident: 10.1016/j.cose.2020.102116_bib0028 article-title: A simple sector-based textual-graphical password scheme with resistance to login-recording attacks publication-title: IEICE Trans. Inform. Syst. doi: 10.1587/transinf.2015EDL8080 contributor: fullname: Ku – volume: 2016 year: 2016 ident: 10.1016/j.cose.2020.102116_bib0038 article-title: Enhancing the security of personal identification numbers with three-dimensional displays publication-title: Mob. Inform. Syst. contributor: fullname: Lee – start-page: 236 year: 2004 ident: 10.1016/j.cose.2020.102116_bib0049 article-title: A pin-entry method resilient against shoulder surfing contributor: fullname: Roth – start-page: 745 year: 2013 ident: 10.1016/j.cose.2020.102116_bib0039 article-title: Secure and usable pin-entry method with shoulder-surfing resistance contributor: fullname: Lee – volume: 66 start-page: 115 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0060 article-title: Draw-a-pin: authentication using finger-drawn pin on touch devices publication-title: Comput. Secur. doi: 10.1016/j.cose.2017.01.008 contributor: fullname: Van Nguyen – volume: 56 start-page: 140 year: 2016 ident: 10.1016/j.cose.2020.102116_bib0040 article-title: Secure bimodal pin-entry method using audio signals publication-title: Comput. Secur. doi: 10.1016/j.cose.2015.06.006 contributor: fullname: Lee – start-page: 268 year: 2018 ident: 10.1016/j.cose.2020.102116_bib0002 article-title: Path word: a multimodal password entry method for ad-hoc authentication based on digits’ shape and smooth pursuit eye movements contributor: fullname: Almoctar – start-page: e5549 year: 2019 ident: 10.1016/j.cose.2020.102116_bib0012 article-title: Securing pin-based authentication in smartwatches with just two gestures publication-title: Concurr. Comput. contributor: fullname: Guerar – start-page: 237 year: 2015 ident: 10.1016/j.cose.2020.102116_bib0059 article-title: Tactile one-time pad: Leakage-resilient authentication for smartphones contributor: fullname: Uellenbeck – start-page: 80 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0057 article-title: Cursor masquerade: Masking of authentic cursor using random numeric keypad and spurious cursors contributor: fullname: Sugumar – start-page: 1 year: 2020 ident: 10.1016/j.cose.2020.102116_bib0022 article-title: Enhancing smartphone lock security using vibration enabled randomly positioned numbers contributor: fullname: Kabir – start-page: 2749 year: 2011 ident: 10.1016/j.cose.2020.102116_bib0064 article-title: Gaze-based password authentication through automatic clustering of gaze points contributor: fullname: Weaver – start-page: 59 year: 2016 ident: 10.1016/j.cose.2020.102116_bib0065 article-title: An observation attacks resistant pin-entry scheme using localized haptic feedback contributor: fullname: Xu – volume: 9 start-page: 777 issue: 1 year: 2019 ident: 10.1016/j.cose.2020.102116_bib0020 article-title: Gaze touch cross pin: Secure multimodal authentication using gaze and touch pin publication-title: Int. J. Eng. Adv. Technol. (IJEAT) doi: 10.35940/ijeat.A1381.109119 contributor: fullname: Ibrahim – start-page: 329 year: 2019 ident: 10.1016/j.cose.2020.102116_bib0030 article-title: Touchgazepath: multimodal interaction with touch and gaze path for secure yet efficient pin entry contributor: fullname: Kumar – start-page: 53 year: 2018 ident: 10.1016/j.cose.2020.102116_bib0048 article-title: Spinpad: A secured pin number based user authentication scheme contributor: fullname: Rajarajan – start-page: 89 year: 2015 ident: 10.1016/j.cose.2020.102116_bib0014 article-title: Revisiting authentication with shoulder-surfing resistance for smartphones contributor: fullname: Higashiyama – start-page: 26 year: 2013 ident: 10.1016/j.cose.2020.102116_bib0036 article-title: Secure and fast pin-entry method for 3d display publication-title: Proceed. Securware contributor: fullname: Lee – start-page: 1410 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0010 article-title: A simple observation attacks resistant pin-entry scheme employing audios contributor: fullname: Dan – start-page: 426 year: 2015 ident: 10.1016/j.cose.2020.102116_bib0050 article-title: Safetypin: Secure pin entry through eye tracking contributor: fullname: Seetharama – volume: 12 start-page: 2875 issue: 12 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0045 article-title: Illusionpin: Shoulder-surfing resistant authentication using hybrid images publication-title: IEEE Trans. Inform. Forens. Secur. doi: 10.1109/TIFS.2017.2725199 contributor: fullname: Papadopoulos – start-page: 281 year: 2015 ident: 10.1016/j.cose.2020.102116_bib0066 article-title: Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass contributor: fullname: Yadav – start-page: 1 year: 2012 ident: 10.1016/j.cose.2020.102116_bib0063 article-title: Cursorcamouflage: multiple dummy cursors as a defense against shoulder surfing contributor: fullname: Watanabe – start-page: 1875 year: 2016 ident: 10.1016/j.cose.2020.102116_bib0008 article-title: On designing leakage-resilient vibration based authentication techniques contributor: fullname: Chakraborty – start-page: 351 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0035 article-title: Reflector: Distance-independent, private pointing on a reflective screen contributor: fullname: Lee – volume: 6 start-page: 65 issue: 2 year: 2010 ident: 10.1016/j.cose.2020.102116_bib0046 article-title: SSSL: shoulder surfing safe login publication-title: J. Comm. Software doi: 10.24138/jcomss.v6i2.191 contributor: fullname: Perković – start-page: 1725 year: 2013 ident: 10.1016/j.cose.2020.102116_bib0041 article-title: User authentication in a multi-touch surface: a chord password system contributor: fullname: Leftheriotis – volume: 40 start-page: 1 year: 2018 ident: 10.1016/j.cose.2020.102116_bib0056 article-title: Incognito: Shoulder-surfing resistant selection method publication-title: J. inform. Secur. Applica. contributor: fullname: Still – start-page: 102 year: 2018 ident: 10.1016/j.cose.2020.102116_bib0017 article-title: Dynamic keypad–digit shuffling for secure pin entry in a virtual world contributor: fullname: Holland – volume: 88 start-page: 101647 year: 2020 ident: 10.1016/j.cose.2020.102116_bib0005 article-title: A survey on smartphone user’s security choices, awareness and education publication-title: Comput. Secur. doi: 10.1016/j.cose.2019.101647 contributor: fullname: Breitinger – start-page: 151 year: 2019 ident: 10.1016/j.cose.2020.102116_bib0029 article-title: Efficient shoulder surfing resistant pin authentication scheme based on localized tactile feedback contributor: fullname: Ku – volume: 3 start-page: 356 issue: 5 year: 2015 ident: 10.1016/j.cose.2020.102116_bib0015 article-title: A password authentication method tolerant to video-recording attacks analyzing multiple authentication operations publication-title: Int. J. Comput. Sci. Electron. Eng. (IJCSEE) contributor: fullname: Hirakawa – volume: 162 start-page: 777 issue: 11 year: 2015 ident: 10.1016/j.cose.2020.102116_bib0019 article-title: The prisma extension statement for reporting of systematic reviews incorporating network meta-analyses of health care interventions: checklist and explanations publication-title: Ann. Internal Med. doi: 10.7326/M14-2385 contributor: fullname: Hutton – start-page: 1 year: 2017 ident: 10.1016/j.cose.2020.102116_bib0001 article-title: Security enhancement in automated teller machine contributor: fullname: Adithya – volume: 4 start-page: 544 year: 2018 ident: 10.1016/j.cose.2020.102116_bib0061 article-title: An efficient security key for practical requirement of pin entry protection section authentication publication-title: Int. J. Adv. Res. Ideas Innov. Technol. contributor: fullname: Vijai – start-page: 207 year: 2016 ident: 10.1016/j.cose.2020.102116_bib0027 article-title: Use the force: Evaluating force-sensitive authentication for mobile devices contributor: fullname: Krombholz – start-page: 1 year: 2009 ident: 10.1016/j.cose.2020.102116_bib0054 article-title: A rotary pin entry scheme resilient to shoulder-surfing contributor: fullname: Shi – volume: 7 start-page: 124366 year: 2019 ident: 10.1016/j.cose.2020.102116_bib0009 article-title: On overcoming the identified limitations of a usable pin entry method publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2937948 contributor: fullname: Chakraborty – start-page: 1403 year: 2015 ident: 10.1016/j.cose.2020.102116_bib0062 article-title: Swipin: fast and secure pin-entry on smartphones contributor: fullname: Von Zezschwitz |
SSID | ssj0017688 |
Score | 2.420296 |
SecondaryResourceType | review_article |
Snippet | •First systematic review on PIN-entry methods resistant to shoulder-surfing attack.•A taxonomy of PIN-entry methods resistant to shoulder-surfing attack is... |
SourceID | crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | 102116 |
SubjectTerms | Authentication Observation attack Password PIN Recording attack Shoulder surfing |
Title | A systematic review of PIN-entry methods resistant to shoulder-surfing attacks |
URI | https://dx.doi.org/10.1016/j.cose.2020.102116 |
Volume | 101 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV25TsNAEB3laGi4EeGItqBDS3x7U0YRUQCRBiKls_YUoXCi2Gn5dmbtdQAJUdDGGcl6Xs-bkd_MA7hhkoWKC0W5MsYu1RaUCRZRHg_9UEgu_MqS5XmWTOfR4yJetGDczMJYWaXL_XVOr7K1-2Xg0Bysl8vBSyWgxwMY4DlF2mVt6CIdRVEHuqOHp-ls9zEBK2q2W_GNAW52ppZ5WVk4tolBtcTAt7bnv_HTN86ZHMK-KxbJqL6fI2jp_BgOGiMG4t7LE5iNyNdGZlJPo5CVIdiy08o5hNRG0QVeK2zBmJekXJHizfpb6w0tthuDFEZ4WdqR-1OYT-5fx1PqjBKoDD2vpImImUl4yIwyvmdS7SHEMrXueyKRPNBDiW1ZEvs6EVjQpYFSSOxpmCotNdZg4Rl08lWuz4EEjKtEIbHh_7DX05gLpS9CDLKGwMb04LaBJ1vX-zCyRij2nlkwMwtmVoPZg7hBMPvxVDNM2H_EXfwz7hL2Aqs5qVTVV9ApN1t9jUVDKfrQvvvw--5ofAJWd8BQ |
link.rule.ids | 315,786,790,4521,24144,27957,27958,45620,45714 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV25TsNAEB2FUEDDjQjnFnRoiY_Y3pRRBAqQpCGR0q32FKFwothp-XZmfQSQEAWtvStZz7szb6Q38wBumWKhFlJToa11Q7UlZZJ1qIi6fiiVkH5hyTIax4Np53kWzRrQr3thnKyyiv1lTC-idfWkXaHZXs7n7ddCQI8HMMBzimmXbcG2o_POv-H-Y6Pz8JFPs82Ab1xedc6UIi8nCsciMShGGPjO9Py37PQt4zwewF5FFUmv_JpDaJj0CPZrGwZS3cpjGPfI1zxmUvaikIUlWLDTwjeElDbRGb7LHF1Mc5IvSPbm3K3NimbrlcUERkSeu4b7E5g-Pkz6A1rZJFAVel5OYxkxG4uQWW19zybGQ4BV4rz3ZKxEYLoKi7I48k0skc4lgdaY1pMw0UYZZGDhKTTTRWrOgARM6FhjWsN1WOkZjITKlyFucnbA1rbgroaHL8tpGLyWib1zByZ3YPISzBZENYL8xz_lGK7_2Hf-z303sDOYjIZ8-DR-uYDdwKlPCn31JTTz1dpcIX3I5XVxPD4B9AbBHg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+systematic+review+of+PIN-entry+methods+resistant+to+shoulder-surfing+attacks&rft.jtitle=Computers+%26+security&rft.au=Binbeshr%2C+Farid&rft.au=Mat+Kiah%2C+M.L.&rft.au=Por%2C+Lip+Yee&rft.au=Zaidan%2C+A.A.&rft.date=2021-02-01&rft.pub=Elsevier+Ltd&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=101&rft_id=info:doi/10.1016%2Fj.cose.2020.102116&rft.externalDocID=S0167404820303898 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |