A systematic review of PIN-entry methods resistant to shoulder-surfing attacks

•First systematic review on PIN-entry methods resistant to shoulder-surfing attack.•A taxonomy of PIN-entry methods resistant to shoulder-surfing attack is presented.•Evaluation metrics, limitations, and recommendations of PIN methods are discussed.•PIN-entry methods are prone to recording-based sho...

Full description

Saved in:
Bibliographic Details
Published inComputers & security Vol. 101; p. 102116
Main Authors Binbeshr, Farid, Mat Kiah, M.L., Por, Lip Yee, Zaidan, A.A.
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.02.2021
Subjects
Online AccessGet full text

Cover

Loading…
Abstract •First systematic review on PIN-entry methods resistant to shoulder-surfing attack.•A taxonomy of PIN-entry methods resistant to shoulder-surfing attack is presented.•Evaluation metrics, limitations, and recommendations of PIN methods are discussed.•PIN-entry methods are prone to recording-based shoulder-surfing attack.•Error rate and PIN-entry time are widely adopted as criteria for usability. Although conventional PIN-entry methods are widely used in many daily authentication procedures, they are highly susceptible to shoulder-surfing attacks. A plethora of PIN-entry methods have been proposed in the literature to mitigate such attacks. Unfortunately, none of these methods is capable of replacing the conventional PIN-entry method. This study presents the results of a systematic review of PIN-entry methods resistant to shoulder-surfing attacks so that the main challenges that impede their adoption can be provided along with opportunities for future research. A systematic search was conducted on seven databases using predefined criteria. A test–retest approach was performed by a single author to extract data. A total of 55 articles were included in this review. The review results manifest that PIN-entry methods are classified mainly into direct and indirect inputs. The user study was the standard research method, and error rate and PIN-entry time were the most frequently adopted usability measures. The review argues that a recording-based shoulder-surfing attack is a major threat to PIN-entry methods. Error rate and PIN-entry time are widely adopted criteria for usability. The review indicates that most PIN-entry methods require a high error rate and PIN-entry time than the conventional method. Moreover, the lack of a standard evaluation framework should be addressed.
AbstractList •First systematic review on PIN-entry methods resistant to shoulder-surfing attack.•A taxonomy of PIN-entry methods resistant to shoulder-surfing attack is presented.•Evaluation metrics, limitations, and recommendations of PIN methods are discussed.•PIN-entry methods are prone to recording-based shoulder-surfing attack.•Error rate and PIN-entry time are widely adopted as criteria for usability. Although conventional PIN-entry methods are widely used in many daily authentication procedures, they are highly susceptible to shoulder-surfing attacks. A plethora of PIN-entry methods have been proposed in the literature to mitigate such attacks. Unfortunately, none of these methods is capable of replacing the conventional PIN-entry method. This study presents the results of a systematic review of PIN-entry methods resistant to shoulder-surfing attacks so that the main challenges that impede their adoption can be provided along with opportunities for future research. A systematic search was conducted on seven databases using predefined criteria. A test–retest approach was performed by a single author to extract data. A total of 55 articles were included in this review. The review results manifest that PIN-entry methods are classified mainly into direct and indirect inputs. The user study was the standard research method, and error rate and PIN-entry time were the most frequently adopted usability measures. The review argues that a recording-based shoulder-surfing attack is a major threat to PIN-entry methods. Error rate and PIN-entry time are widely adopted criteria for usability. The review indicates that most PIN-entry methods require a high error rate and PIN-entry time than the conventional method. Moreover, the lack of a standard evaluation framework should be addressed.
ArticleNumber 102116
Author Mat Kiah, M.L.
Zaidan, A.A.
Binbeshr, Farid
Por, Lip Yee
Author_xml – sequence: 1
  givenname: Farid
  surname: Binbeshr
  fullname: Binbeshr, Farid
  email: farid@hu.edu.ye
  organization: Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia
– sequence: 2
  givenname: M.L.
  surname: Mat Kiah
  fullname: Mat Kiah, M.L.
  email: misslaiha@um.edu.my
  organization: Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia
– sequence: 3
  givenname: Lip Yee
  surname: Por
  fullname: Por, Lip Yee
  email: porlip@um.edu.my
  organization: Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia
– sequence: 4
  givenname: A.A.
  surname: Zaidan
  fullname: Zaidan, A.A.
  email: aws.alaa@fskik.upsi.edu.my
  organization: Department of Computing, Sultan Idris University of Education (UPSI), Tanjong Malim, Malaysia
BookMark eNp9kM9OAjEQhxuDiYC-gKe-wGKnC21JvBDiHxKCHvTcdNupFGFr2qLh7d0Nnj1NMvP7JjPfiAza2CIht8AmwEDc7SY2ZpxwxvsGBxAXZAhK8kpwpgZk2IVkNWVTdUVGOe8YAymUGpLNguZTLngwJVia8DvgD42evq42FbYlnegByza63M1yyMW0hZZI8zYe9w5TlY_Jh_aDmlKM_czX5NKbfcabvzom748Pb8vnav3ytFou1pWtGSuVaGbKC1Mr7zwwL5E1MLNSQj1rhDUc5xbmIGaAopnzWnLnQIGspUOLTNX1mPDzXptizgm9_krhYNJJA9O9Eb3TvRHdG9FnIx10f4awu6x7NOlsA7YWXUhoi3Yx_If_Ar19bCI
CitedBy_id crossref_primary_10_3390_fi13120299
crossref_primary_10_3390_app14052045
crossref_primary_10_1109_ACCESS_2023_3243114
crossref_primary_10_3390_app131810040
crossref_primary_10_1016_j_cose_2022_103040
crossref_primary_10_1142_S021962202250050X
crossref_primary_10_1007_s12652_021_03679_8
crossref_primary_10_1186_s12913_022_08235_4
crossref_primary_10_1016_j_sna_2024_115572
crossref_primary_10_3390_s23094441
crossref_primary_10_1016_j_cose_2024_103771
crossref_primary_10_1007_s11042_023_15227_x
Cites_doi 10.1109/TIFS.2014.2307671
10.1016/j.compeleceng.2017.05.006
10.1109/THMS.2015.2454498
10.12988/ces.2015.56164
10.1109/TSMC.2013.2270227
10.1016/j.cose.2018.05.012
10.1108/IJPCC-07-2014-0041
10.1002/nem.1998
10.1016/j.cose.2016.05.007
10.1109/TIFS.2014.2374352
10.1587/transinf.2015EDL8080
10.1016/j.cose.2017.01.008
10.1016/j.cose.2015.06.006
10.35940/ijeat.A1381.109119
10.1109/TIFS.2017.2725199
10.24138/jcomss.v6i2.191
10.1016/j.cose.2019.101647
10.7326/M14-2385
10.1109/ACCESS.2019.2937948
ContentType Journal Article
Copyright 2020 Elsevier Ltd
Copyright_xml – notice: 2020 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.cose.2020.102116
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6208
ExternalDocumentID 10_1016_j_cose_2020_102116
S0167404820303898
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
AAXKI
AAYXX
AFJKZ
AKRWK
CITATION
ID FETCH-LOGICAL-c300t-6b58f6a38fdf10f7e0b15c77135b6ca2e9c191651e6b92372dd181737dece0833
IEDL.DBID AIKHN
ISSN 0167-4048
IngestDate Thu Sep 26 16:23:32 EDT 2024
Fri Feb 23 02:49:01 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Shoulder surfing
Recording attack
Observation attack
PIN
Authentication
Password
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c300t-6b58f6a38fdf10f7e0b15c77135b6ca2e9c191651e6b92372dd181737dece0833
ParticipantIDs crossref_primary_10_1016_j_cose_2020_102116
elsevier_sciencedirect_doi_10_1016_j_cose_2020_102116
PublicationCentury 2000
PublicationDate February 2021
2021-02-00
PublicationDateYYYYMMDD 2021-02-01
PublicationDate_xml – month: 02
  year: 2021
  text: February 2021
PublicationDecade 2020
PublicationTitle Computers & security
PublicationYear 2021
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Rajarajan, Kalita, Gayatri, Priyadarsini (bib0048) 2018
Breitinger, Tully-Doyle, Hassenfeldt (bib0005) 2020; 88
Higashiyama, Yanai, Okamura, Fujiwara (bib0014) 2015
Watanabe, Higuchi, Inami, Igarashi (bib0063) 2012
Uellenbeck, Hupperich, Wolf, Holz (bib0059) 2015
Van Nguyen, Sae-Bae, Memon (bib0060) 2017; 66
Lee, Nam, Kim (bib0040) 2016; 56
Leftheriotis (bib0041) 2013
Seo, Kim (bib0051) 2017; 15
Sugumar, Soundararajan (bib0057) 2017
Alsuhibany, Almutairi (bib0003) 2016; 14
Takada, Kokubun (bib0058) 2014
Kwon, Na (bib0033) 2015; 46
Jeon, I.-S., Yoon, E.-J., 2015. A simple pin input technique resisting shoulder surfing and smudge attacks.
Shen, Yu, Xu, Yang, Guan (bib0053) 2016; 61
Almoctar, Irani, Peysakhovich, Hurter (bib0002) 2018
Ibrahim, Ambreen (bib0020) 2019; 9
Kumar, Akbari, Menges, MacKenzie, Staab (bib0030) 2019
Perković, Čagalj, Saxena (bib0047) 2010
Ku, Xu (bib0029) 2019
Nandhini, Jayanthy (bib0043) 2019
Still, Bell (bib0056) 2018; 40
Chakraborty, Li, Mondal, Chen, Pan (bib0009) 2019; 7
Kim, Sharma, Cardenas, Prabakar, Iyengar (bib0026) 2017
Critical Appraisal Skills Programme (2018). CASP (Qualitative) Checklist. [online] Available at
Souza, Cunha, B Oliveira (bib0055) 2018; 28
Yadav, Ionascu, Ongole, Roy, Memon (bib0066) 2015
Kwon, Na (bib0032) 2014
Lee, Kim, Fukumoto, Lee (bib0035) 2017
Lee, Nam (bib0036) 2013
Guerar, Migliardi, Palmieri, Verderame, Merlo (bib0012) 2019
Holland, Morelli (bib0017) 2018
Hirakawa, Kogure, Ohzeki (bib0015) 2015; 3
Khamis, Hassib, Zezschwitz, Bulling, Alt (bib0025) 2017
Vijai, Kottayam, Joseph (bib0061) 2018; 4
Nyang, Kim, Lee, Kang, Cho, Lee, Mohaisen (bib0044) 2018; 78
Lee, Nam (bib0039) 2013
Lee, Kim, Franklin (bib0038) 2016; 2016
Chakraborty, Anand, Randhawa, Mondal (bib0008) 2016
Gugenheimer, De Luca, Hess, Karg, Wolf, Rukzio (bib0013) 2015
Kwon, Shin, Na (bib0034) 2014; 44
Von Zezschwitz, De Luca, Brunkow, Hussmann (bib0062) 2015
Carneiro, Elmadjian, Gonzales, Coutinho, Morimoto (bib0006) 2019
Li, Wu, Liu, Hu, Qin, Wu (bib0042) 2017
Roth, Richter, Freidinger (bib0049) 2004
Greene, Franklin, Greene, Kelsey (bib0011) 2016
Xu, Ku, Dan (bib0065) 2016
Papadopoulos, Nguyen, Durmus, Memon (bib0045) 2017; 12
Accessed: 2019-09-30.
Keele (bib0024) 2007
Hopper, Blum (bib0018) 2001
Kabir, Hasan, Tahmid, Ovi, Rozario (bib0022) 2020
Seetharama, Paelke, Röcker (bib0050) 2015
Adithya, Aishwarya, Megalai, Priyadharshini, Kurinjimalar (bib0001) 2017
Shi, Zhu, Youssef (bib0054) 2009
Kwon, Hong (bib0031) 2015; 2
Lee (bib0037) 2014; 9
Aris, Yaakob (bib0004) 2018
Hirakawa, Kurihara, Ohzeki (bib0016) 2017
Dan, Ku (bib0010) 2017
Perković, Čagalj, Rakić (bib0046) 2010; 6
Ku, Cheng, Yeh, Chang (bib0028) 2016; 99
Seo, Kim, Kim, Liu (bib0052) 2017; 63
Kasat, Bhadade (bib0023) 2018
Krombholz, Hupperich, Holz (bib0027) 2016
Weaver, Mock, Hoanca (bib0064) 2011
Hutton, Salanti, Caldwell, Chaimani, Schmid, Cameron, Ioannidis, Straus, Thorlund, Jansen (bib0019) 2015; 162
Lee (10.1016/j.cose.2020.102116_bib0039) 2013
Rajarajan (10.1016/j.cose.2020.102116_bib0048) 2018
Keele (10.1016/j.cose.2020.102116_bib0024) 2007
Khamis (10.1016/j.cose.2020.102116_bib0025) 2017
Lee (10.1016/j.cose.2020.102116_bib0037) 2014; 9
Still (10.1016/j.cose.2020.102116_bib0056) 2018; 40
Lee (10.1016/j.cose.2020.102116_bib0036) 2013
Shi (10.1016/j.cose.2020.102116_bib0054) 2009
Dan (10.1016/j.cose.2020.102116_bib0010) 2017
Guerar (10.1016/j.cose.2020.102116_bib0012) 2019
Hutton (10.1016/j.cose.2020.102116_bib0019) 2015; 162
Kwon (10.1016/j.cose.2020.102116_bib0031) 2015; 2
Xu (10.1016/j.cose.2020.102116_bib0065) 2016
Lee (10.1016/j.cose.2020.102116_bib0035) 2017
Almoctar (10.1016/j.cose.2020.102116_bib0002) 2018
Takada (10.1016/j.cose.2020.102116_bib0058) 2014
Kim (10.1016/j.cose.2020.102116_bib0026) 2017
Roth (10.1016/j.cose.2020.102116_bib0049) 2004
Watanabe (10.1016/j.cose.2020.102116_bib0063) 2012
Kasat (10.1016/j.cose.2020.102116_bib0023) 2018
Gugenheimer (10.1016/j.cose.2020.102116_bib0013) 2015
Perković (10.1016/j.cose.2020.102116_bib0046) 2010; 6
Breitinger (10.1016/j.cose.2020.102116_bib0005) 2020; 88
Seo (10.1016/j.cose.2020.102116_bib0052) 2017; 63
10.1016/j.cose.2020.102116_bib0007
Kabir (10.1016/j.cose.2020.102116_bib0022) 2020
Uellenbeck (10.1016/j.cose.2020.102116_bib0059) 2015
Hopper (10.1016/j.cose.2020.102116_bib0018) 2001
Li (10.1016/j.cose.2020.102116_bib0042) 2017
Kwon (10.1016/j.cose.2020.102116_bib0034) 2014; 44
Lee (10.1016/j.cose.2020.102116_bib0038) 2016; 2016
Von Zezschwitz (10.1016/j.cose.2020.102116_bib0062) 2015
Hirakawa (10.1016/j.cose.2020.102116_bib0015) 2015; 3
Kumar (10.1016/j.cose.2020.102116_bib0030) 2019
Leftheriotis (10.1016/j.cose.2020.102116_bib0041) 2013
Carneiro (10.1016/j.cose.2020.102116_bib0006) 2019
Chakraborty (10.1016/j.cose.2020.102116_bib0008) 2016
Nandhini (10.1016/j.cose.2020.102116_bib0043) 2019
Yadav (10.1016/j.cose.2020.102116_bib0066) 2015
Weaver (10.1016/j.cose.2020.102116_bib0064) 2011
Hirakawa (10.1016/j.cose.2020.102116_bib0016) 2017
Nyang (10.1016/j.cose.2020.102116_bib0044) 2018; 78
Kwon (10.1016/j.cose.2020.102116_bib0033) 2015; 46
Alsuhibany (10.1016/j.cose.2020.102116_bib0003) 2016; 14
Vijai (10.1016/j.cose.2020.102116_bib0061) 2018; 4
Lee (10.1016/j.cose.2020.102116_bib0040) 2016; 56
Ku (10.1016/j.cose.2020.102116_bib0029) 2019
Kwon (10.1016/j.cose.2020.102116_bib0032) 2014
Papadopoulos (10.1016/j.cose.2020.102116_bib0045) 2017; 12
Ibrahim (10.1016/j.cose.2020.102116_bib0020) 2019; 9
Adithya (10.1016/j.cose.2020.102116_bib0001) 2017
Greene (10.1016/j.cose.2020.102116_bib0011) 2016
Souza (10.1016/j.cose.2020.102116_bib0055) 2018; 28
Chakraborty (10.1016/j.cose.2020.102116_bib0009) 2019; 7
Higashiyama (10.1016/j.cose.2020.102116_bib0014) 2015
Aris (10.1016/j.cose.2020.102116_bib0004) 2018
Van Nguyen (10.1016/j.cose.2020.102116_bib0060) 2017; 66
Sugumar (10.1016/j.cose.2020.102116_bib0057) 2017
10.1016/j.cose.2020.102116_bib0021
Ku (10.1016/j.cose.2020.102116_bib0028) 2016; 99
Shen (10.1016/j.cose.2020.102116_bib0053) 2016; 61
Holland (10.1016/j.cose.2020.102116_bib0017) 2018
Perković (10.1016/j.cose.2020.102116_bib0047) 2010
Seo (10.1016/j.cose.2020.102116_bib0051) 2017; 15
Krombholz (10.1016/j.cose.2020.102116_bib0027) 2016
Seetharama (10.1016/j.cose.2020.102116_bib0050) 2015
References_xml – volume: 162
  start-page: 777
  year: 2015
  end-page: 784
  ident: bib0019
  article-title: The prisma extension statement for reporting of systematic reviews incorporating network meta-analyses of health care interventions: checklist and explanations
  publication-title: Ann. Internal Med.
  contributor:
    fullname: Jansen
– volume: 15
  start-page: 91
  year: 2017
  end-page: 96
  ident: bib0051
  article-title: Hidden indicator based pin-entry method using audio signals
  publication-title: J. Inform. Commun. Converg. Eng.
  contributor:
    fullname: Kim
– start-page: 1725
  year: 2013
  end-page: 1730
  ident: bib0041
  article-title: User authentication in a multi-touch surface: a chord password system
  publication-title: CHI’13 Extended Abstracts on Human Factors in Computing Systems
  contributor:
    fullname: Leftheriotis
– volume: 12
  start-page: 2875
  year: 2017
  end-page: 2889
  ident: bib0045
  article-title: Illusionpin: Shoulder-surfing resistant authentication using hybrid images
  publication-title: IEEE Trans. Inform. Forens. Secur.
  contributor:
    fullname: Memon
– start-page: 89
  year: 2015
  end-page: 95
  ident: bib0014
  article-title: Revisiting authentication with shoulder-surfing resistance for smartphones
  publication-title: 2015 Third International Symposium on Computing and Networking (CANDAR)
  contributor:
    fullname: Fujiwara
– volume: 28
  start-page: e1998
  year: 2018
  ident: bib0055
  article-title: Nomadikey: user authentication for smart devices based on nomadic keys
  publication-title: Int. J. Netw. Manag.
  contributor:
    fullname: B Oliveira
– volume: 14
  start-page: 328
  year: 2016
  ident: bib0003
  article-title: Making pin and password entry secure against shoulder surfing using camouflage characters
  publication-title: Int. J. Comput. Sci. Inform. Secur.
  contributor:
    fullname: Almutairi
– start-page: 351
  year: 2017
  end-page: 364
  ident: bib0035
  article-title: Reflector: Distance-independent, private pointing on a reflective screen
  publication-title: Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology
  contributor:
    fullname: Lee
– volume: 40
  start-page: 1
  year: 2018
  end-page: 8
  ident: bib0056
  article-title: Incognito: Shoulder-surfing resistant selection method
  publication-title: J. inform. Secur. Applica.
  contributor:
    fullname: Bell
– start-page: 274
  year: 2015
  end-page: 283
  ident: bib0013
  article-title: Colorsnakes: using colored decoys to secure authentication in sensitive contexts
  publication-title: Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services
  contributor:
    fullname: Rukzio
– start-page: 1144
  year: 2017
  end-page: 1148
  ident: bib0016
  article-title: Borderless interface for user authentication method tolerant against multiple video-recording attacks
  publication-title: 2017 International Conference on Computer Systems, Electronics and Control (ICCSEC)
  contributor:
    fullname: Ohzeki
– volume: 2
  start-page: 278
  year: 2015
  end-page: 292
  ident: bib0031
  article-title: Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks
  publication-title: IEEE Trans. Inform. Forens. Secur.
  contributor:
    fullname: Hong
– start-page: 52
  year: 2001
  end-page: 66
  ident: bib0018
  article-title: Secure human identification protocols
  publication-title: International conference on the theory and application of cryptology and information security
  contributor:
    fullname: Blum
– start-page: 1410
  year: 2017
  end-page: 1413
  ident: bib0010
  article-title: A simple observation attacks resistant pin-entry scheme employing audios
  publication-title: 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN)
  contributor:
    fullname: Ku
– volume: 78
  start-page: 1
  year: 2018
  end-page: 15
  ident: bib0044
  article-title: Two-thumbs-up: Physical protection for pin entry secure against recording attacks
  publication-title: Comput. Secur.
  contributor:
    fullname: Mohaisen
– start-page: 1
  year: 2012
  end-page: 2
  ident: bib0063
  article-title: Cursorcamouflage: multiple dummy cursors as a defense against shoulder surfing
  publication-title: SIGGRAPH Asia 2012 Emerging Technologies
  contributor:
    fullname: Igarashi
– start-page: 446
  year: 2017
  end-page: 450
  ident: bib0025
  article-title: Gazetouchpin: protecting sensitive data on mobile devices using secure multimodal authentication
  publication-title: Proceedings of the 19th ACM International Conference on Multimodal Interaction
  contributor:
    fullname: Alt
– start-page: 1403
  year: 2015
  end-page: 1406
  ident: bib0062
  article-title: Swipin: fast and secure pin-entry on smartphones
  publication-title: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
  contributor:
    fullname: Hussmann
– volume: 46
  start-page: 143
  year: 2015
  end-page: 150
  ident: bib0033
  article-title: Steganopin: two-faced human–machine interface for practical enforcement of pin entry security
  publication-title: IEEE Trans. Human-Mach. Syst.
  contributor:
    fullname: Na
– start-page: 237
  year: 2015
  end-page: 253
  ident: bib0059
  article-title: Tactile one-time pad: Leakage-resilient authentication for smartphones
  publication-title: International Conference on Financial Cryptography and Data Security
  contributor:
    fullname: Holz
– year: 2007
  ident: bib0024
  article-title: Guidelines for performing systematic literature reviews in software engineering
  publication-title: Technical Report
  contributor:
    fullname: Keele
– start-page: 1
  year: 2009
  end-page: 7
  ident: bib0054
  article-title: A rotary pin entry scheme resilient to shoulder-surfing
  publication-title: 2009 International Conference for Internet Technology and Secured Transactions,(ICITST)
  contributor:
    fullname: Youssef
– year: 2016
  ident: bib0011
  article-title: Measuring the Usability and Security of Permuted Passwords on Mobile Platforms
  contributor:
    fullname: Kelsey
– volume: 3
  start-page: 356
  year: 2015
  end-page: 360
  ident: bib0015
  article-title: A password authentication method tolerant to video-recording attacks analyzing multiple authentication operations
  publication-title: Int. J. Comput. Sci. Electron. Eng. (IJCSEE)
  contributor:
    fullname: Ohzeki
– volume: 56
  start-page: 140
  year: 2016
  end-page: 150
  ident: bib0040
  article-title: Secure bimodal pin-entry method using audio signals
  publication-title: Comput. Secur.
  contributor:
    fullname: Kim
– volume: 4
  start-page: 544
  year: 2018
  end-page: 549
  ident: bib0061
  article-title: An efficient security key for practical requirement of pin entry protection section authentication
  publication-title: Int. J. Adv. Res. Ideas Innov. Technol.
  contributor:
    fullname: Joseph
– start-page: 435
  year: 2017
  end-page: 453
  ident: bib0042
  article-title: Eyesec: a practical shoulder-surfing resistant gaze-based authentication system
  publication-title: International Conference on Information Security Practice and Experience
  contributor:
    fullname: Wu
– start-page: 1
  year: 2017
  end-page: 5
  ident: bib0001
  article-title: Security enhancement in automated teller machine
  publication-title: 2017 International Conference on Intelligent Computing and Control (I2C2)
  contributor:
    fullname: Kurinjimalar
– volume: 63
  start-page: 160
  year: 2017
  end-page: 167
  ident: bib0052
  article-title: Personal identification number entry for google glass
  publication-title: Comput. Electr. Eng.
  contributor:
    fullname: Liu
– volume: 66
  start-page: 115
  year: 2017
  end-page: 128
  ident: bib0060
  article-title: Draw-a-pin: authentication using finger-drawn pin on touch devices
  publication-title: Comput. Secur.
  contributor:
    fullname: Memon
– start-page: 7
  year: 2018
  end-page: 14
  ident: bib0004
  article-title: Shoulder surf resistant screen locking for smartphones: a review of fifty non-biometric methods
  publication-title: 2018 IEEE Conference on Application, Information and Network Security (AINS)
  contributor:
    fullname: Yaakob
– start-page: 745
  year: 2013
  end-page: 748
  ident: bib0039
  article-title: Secure and usable pin-entry method with shoulder-surfing resistance
  publication-title: International Conference on Human-Computer Interaction
  contributor:
    fullname: Nam
– start-page: 351
  year: 2010
  end-page: 358
  ident: bib0047
  article-title: Shoulder-surfing safe login in a partially observable attacker model
  publication-title: International Conference on Financial Cryptography and Data Security
  contributor:
    fullname: Saxena
– start-page: 80
  year: 2017
  end-page: 84
  ident: bib0057
  article-title: Cursor masquerade: Masking of authentic cursor using random numeric keypad and spurious cursors
  publication-title: 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)
  contributor:
    fullname: Soundararajan
– start-page: 26
  year: 2013
  end-page: 29
  ident: bib0036
  article-title: Secure and fast pin-entry method for 3d display
  publication-title: Proceed. Securware
  contributor:
    fullname: Nam
– start-page: 1875
  year: 2016
  end-page: 1881
  ident: bib0008
  article-title: On designing leakage-resilient vibration based authentication techniques
  publication-title: 2016 IEEE Trustcom/BigDataSE/ISPA
  contributor:
    fullname: Mondal
– start-page: 1
  year: 2018
  end-page: 5
  ident: bib0023
  article-title: Revolving flywheel pin entry method to prevent shoulder surfing attacks
  publication-title: 2018 3rd International Conference for Convergence in Technology (I2CT)
  contributor:
    fullname: Bhadade
– volume: 7
  start-page: 124366
  year: 2019
  end-page: 124378
  ident: bib0009
  article-title: On overcoming the identified limitations of a usable pin entry method
  publication-title: IEEE Access
  contributor:
    fullname: Pan
– volume: 2016
  year: 2016
  ident: bib0038
  article-title: Enhancing the security of personal identification numbers with three-dimensional displays
  publication-title: Mob. Inform. Syst.
  contributor:
    fullname: Franklin
– start-page: 59
  year: 2016
  end-page: 64
  ident: bib0065
  article-title: An observation attacks resistant pin-entry scheme using localized haptic feedback
  publication-title: 2016 IEEE Region 10 Symposium (TENSYMP)
  contributor:
    fullname: Dan
– start-page: 281
  year: 2015
  end-page: 297
  ident: bib0066
  article-title: Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass
  publication-title: International conference on financial cryptography and data security
  contributor:
    fullname: Memon
– start-page: 151
  year: 2019
  end-page: 156
  ident: bib0029
  article-title: Efficient shoulder surfing resistant pin authentication scheme based on localized tactile feedback
  publication-title: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
  contributor:
    fullname: Xu
– start-page: 226
  year: 2019
  end-page: 233
  ident: bib0006
  article-title: Pursuitpass: A visual pursuit-based user authentication system
  publication-title: 2019 32nd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)
  contributor:
    fullname: Morimoto
– start-page: 68
  year: 2017
  end-page: 73
  ident: bib0026
  article-title: Dynamicpin: A novel approach towards secure atm authentication
  publication-title: 2017 International Conference on Computational Science and Computational Intelligence (CSCI)
  contributor:
    fullname: Iyengar
– start-page: 453
  year: 2019
  end-page: 467
  ident: bib0043
  article-title: Mobile communication based security for atm pin entry
  publication-title: International Conference on Computer Networks and Communication Technologies
  contributor:
    fullname: Jayanthy
– start-page: 426
  year: 2015
  end-page: 435
  ident: bib0050
  article-title: Safetypin: Secure pin entry through eye tracking
  publication-title: International Conference on Human Aspects of Information Security, Privacy, and Trust
  contributor:
    fullname: Röcker
– volume: 9
  start-page: 777
  year: 2019
  end-page: 781
  ident: bib0020
  article-title: Gaze touch cross pin: Secure multimodal authentication using gaze and touch pin
  publication-title: Int. J. Eng. Adv. Technol. (IJEAT)
  contributor:
    fullname: Ambreen
– volume: 99
  start-page: 529
  year: 2016
  end-page: 532
  ident: bib0028
  article-title: A simple sector-based textual-graphical password scheme with resistance to login-recording attacks
  publication-title: IEICE Trans. Inform. Syst.
  contributor:
    fullname: Chang
– start-page: 53
  year: 2018
  end-page: 59
  ident: bib0048
  article-title: Spinpad: A secured pin number based user authentication scheme
  publication-title: 2018 International Conference on Recent Trends in Advance Computing (ICRTAC)
  contributor:
    fullname: Priyadarsini
– volume: 44
  start-page: 716
  year: 2014
  end-page: 727
  ident: bib0034
  article-title: Covert attentional shoulder surfing: human adversaries are more powerful than expected
  publication-title: IEEE Trans. Syst. Man Cybernet.
  contributor:
    fullname: Na
– volume: 88
  start-page: 101647
  year: 2020
  ident: bib0005
  article-title: A survey on smartphone user’s security choices, awareness and education
  publication-title: Comput. Secur.
  contributor:
    fullname: Hassenfeldt
– start-page: 23
  year: 2014
  end-page: 24
  ident: bib0032
  article-title: Switchpin: Securing smartphone pin entry with switchable keypads
  publication-title: 2014 IEEE International Conference on Consumer Electronics (ICCE)
  contributor:
    fullname: Na
– start-page: 207
  year: 2016
  end-page: 219
  ident: bib0027
  article-title: Use the force: Evaluating force-sensitive authentication for mobile devices
  publication-title: Twelfth Symposium on Usable Privacy and Security (
  contributor:
    fullname: Holz
– start-page: 329
  year: 2019
  end-page: 338
  ident: bib0030
  article-title: Touchgazepath: multimodal interaction with touch and gaze path for secure yet efficient pin entry
  publication-title: 2019 International Conference on Multimodal Interaction
  contributor:
    fullname: Staab
– start-page: 1
  year: 2020
  end-page: 7
  ident: bib0022
  article-title: Enhancing smartphone lock security using vibration enabled randomly positioned numbers
  publication-title: Proceedings of the International Conference on Computing Advancements
  contributor:
    fullname: Rozario
– start-page: 102
  year: 2018
  end-page: 111
  ident: bib0017
  article-title: Dynamic keypad–digit shuffling for secure pin entry in a virtual world
  publication-title: International Conference on Virtual, Augmented and Mixed Reality
  contributor:
    fullname: Morelli
– start-page: e5549
  year: 2019
  ident: bib0012
  article-title: Securing pin-based authentication in smartwatches with just two gestures
  publication-title: Concurr. Comput.
  contributor:
    fullname: Merlo
– volume: 6
  start-page: 65
  year: 2010
  end-page: 73
  ident: bib0046
  article-title: SSSL: shoulder surfing safe login
  publication-title: J. Comm. Software
  contributor:
    fullname: Rakić
– start-page: 236
  year: 2004
  end-page: 245
  ident: bib0049
  article-title: A pin-entry method resilient against shoulder surfing
  publication-title: Proceedings of the 11th ACM conference on Computer and communications security
  contributor:
    fullname: Freidinger
– volume: 9
  start-page: 695
  year: 2014
  end-page: 708
  ident: bib0037
  article-title: Security notions and advanced method for human shoulder-surfing resistant pin-entry
  publication-title: IEEE Trans. Inform. Forens. Secur.
  contributor:
    fullname: Lee
– volume: 61
  start-page: 130
  year: 2016
  end-page: 141
  ident: bib0053
  article-title: User practice in password security: An empirical study of real-life passwords in the wild
  publication-title: Comput. Secur.
  contributor:
    fullname: Guan
– start-page: 268
  year: 2018
  end-page: 277
  ident: bib0002
  article-title: Path word: a multimodal password entry method for ad-hoc authentication based on digits’ shape and smooth pursuit eye movements
  publication-title: Proceedings of the 20th ACM International Conference on Multimodal Interaction
  contributor:
    fullname: Hurter
– start-page: 2749
  year: 2011
  end-page: 2754
  ident: bib0064
  article-title: Gaze-based password authentication through automatic clustering of gaze points
  publication-title: 2011 IEEE International Conference on Systems, Man, and Cybernetics
  contributor:
    fullname: Hoanca
– year: 2014
  ident: bib0058
  article-title: Mtapin: multi-touch key input enhances security of pin authentication while keeping usability
  publication-title: Int. J. Pervas. Comput. Commun.
  contributor:
    fullname: Kokubun
– start-page: 446
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0025
  article-title: Gazetouchpin: protecting sensitive data on mobile devices using secure multimodal authentication
  contributor:
    fullname: Khamis
– volume: 9
  start-page: 695
  issue: 4
  year: 2014
  ident: 10.1016/j.cose.2020.102116_bib0037
  article-title: Security notions and advanced method for human shoulder-surfing resistant pin-entry
  publication-title: IEEE Trans. Inform. Forens. Secur.
  doi: 10.1109/TIFS.2014.2307671
  contributor:
    fullname: Lee
– volume: 63
  start-page: 160
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0052
  article-title: Personal identification number entry for google glass
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2017.05.006
  contributor:
    fullname: Seo
– volume: 46
  start-page: 143
  issue: 1
  year: 2015
  ident: 10.1016/j.cose.2020.102116_bib0033
  article-title: Steganopin: two-faced human–machine interface for practical enforcement of pin entry security
  publication-title: IEEE Trans. Human-Mach. Syst.
  doi: 10.1109/THMS.2015.2454498
  contributor:
    fullname: Kwon
– start-page: 7
  year: 2018
  ident: 10.1016/j.cose.2020.102116_bib0004
  article-title: Shoulder surf resistant screen locking for smartphones: a review of fifty non-biometric methods
  contributor:
    fullname: Aris
– start-page: 274
  year: 2015
  ident: 10.1016/j.cose.2020.102116_bib0013
  article-title: Colorsnakes: using colored decoys to secure authentication in sensitive contexts
  contributor:
    fullname: Gugenheimer
– ident: 10.1016/j.cose.2020.102116_bib0021
  doi: 10.12988/ces.2015.56164
– start-page: 453
  year: 2019
  ident: 10.1016/j.cose.2020.102116_bib0043
  article-title: Mobile communication based security for atm pin entry
  contributor:
    fullname: Nandhini
– volume: 44
  start-page: 716
  issue: 6
  year: 2014
  ident: 10.1016/j.cose.2020.102116_bib0034
  article-title: Covert attentional shoulder surfing: human adversaries are more powerful than expected
  publication-title: IEEE Trans. Syst. Man Cybernet.
  doi: 10.1109/TSMC.2013.2270227
  contributor:
    fullname: Kwon
– start-page: 351
  year: 2010
  ident: 10.1016/j.cose.2020.102116_bib0047
  article-title: Shoulder-surfing safe login in a partially observable attacker model
  contributor:
    fullname: Perković
– year: 2016
  ident: 10.1016/j.cose.2020.102116_bib0011
  contributor:
    fullname: Greene
– year: 2007
  ident: 10.1016/j.cose.2020.102116_bib0024
  article-title: Guidelines for performing systematic literature reviews in software engineering
  contributor:
    fullname: Keele
– start-page: 226
  year: 2019
  ident: 10.1016/j.cose.2020.102116_bib0006
  article-title: Pursuitpass: A visual pursuit-based user authentication system
  contributor:
    fullname: Carneiro
– volume: 15
  start-page: 91
  issue: 2
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0051
  article-title: Hidden indicator based pin-entry method using audio signals
  publication-title: J. Inform. Commun. Converg. Eng.
  contributor:
    fullname: Seo
– volume: 78
  start-page: 1
  year: 2018
  ident: 10.1016/j.cose.2020.102116_bib0044
  article-title: Two-thumbs-up: Physical protection for pin entry secure against recording attacks
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2018.05.012
  contributor:
    fullname: Nyang
– start-page: 23
  year: 2014
  ident: 10.1016/j.cose.2020.102116_bib0032
  article-title: Switchpin: Securing smartphone pin entry with switchable keypads
  contributor:
    fullname: Kwon
– volume: 14
  start-page: 328
  issue: 7
  year: 2016
  ident: 10.1016/j.cose.2020.102116_bib0003
  article-title: Making pin and password entry secure against shoulder surfing using camouflage characters
  publication-title: Int. J. Comput. Sci. Inform. Secur.
  contributor:
    fullname: Alsuhibany
– year: 2014
  ident: 10.1016/j.cose.2020.102116_bib0058
  article-title: Mtapin: multi-touch key input enhances security of pin authentication while keeping usability
  publication-title: Int. J. Pervas. Comput. Commun.
  doi: 10.1108/IJPCC-07-2014-0041
  contributor:
    fullname: Takada
– ident: 10.1016/j.cose.2020.102116_bib0007
– volume: 28
  start-page: e1998
  issue: 1
  year: 2018
  ident: 10.1016/j.cose.2020.102116_bib0055
  article-title: Nomadikey: user authentication for smart devices based on nomadic keys
  publication-title: Int. J. Netw. Manag.
  doi: 10.1002/nem.1998
  contributor:
    fullname: Souza
– start-page: 52
  year: 2001
  ident: 10.1016/j.cose.2020.102116_bib0018
  article-title: Secure human identification protocols
  contributor:
    fullname: Hopper
– volume: 61
  start-page: 130
  year: 2016
  ident: 10.1016/j.cose.2020.102116_bib0053
  article-title: User practice in password security: An empirical study of real-life passwords in the wild
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2016.05.007
  contributor:
    fullname: Shen
– start-page: 68
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0026
  article-title: Dynamicpin: A novel approach towards secure atm authentication
  contributor:
    fullname: Kim
– start-page: 435
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0042
  article-title: Eyesec: a practical shoulder-surfing resistant gaze-based authentication system
  contributor:
    fullname: Li
– volume: 2
  start-page: 278
  issue: 10
  year: 2015
  ident: 10.1016/j.cose.2020.102116_bib0031
  article-title: Analysis and improvement of a pin-entry method resilient to shoulder-surfing and recording attacks
  publication-title: IEEE Trans. Inform. Forens. Secur.
  doi: 10.1109/TIFS.2014.2374352
  contributor:
    fullname: Kwon
– start-page: 1144
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0016
  article-title: Borderless interface for user authentication method tolerant against multiple video-recording attacks
  contributor:
    fullname: Hirakawa
– start-page: 1
  year: 2018
  ident: 10.1016/j.cose.2020.102116_bib0023
  article-title: Revolving flywheel pin entry method to prevent shoulder surfing attacks
  contributor:
    fullname: Kasat
– volume: 99
  start-page: 529
  issue: 2
  year: 2016
  ident: 10.1016/j.cose.2020.102116_bib0028
  article-title: A simple sector-based textual-graphical password scheme with resistance to login-recording attacks
  publication-title: IEICE Trans. Inform. Syst.
  doi: 10.1587/transinf.2015EDL8080
  contributor:
    fullname: Ku
– volume: 2016
  year: 2016
  ident: 10.1016/j.cose.2020.102116_bib0038
  article-title: Enhancing the security of personal identification numbers with three-dimensional displays
  publication-title: Mob. Inform. Syst.
  contributor:
    fullname: Lee
– start-page: 236
  year: 2004
  ident: 10.1016/j.cose.2020.102116_bib0049
  article-title: A pin-entry method resilient against shoulder surfing
  contributor:
    fullname: Roth
– start-page: 745
  year: 2013
  ident: 10.1016/j.cose.2020.102116_bib0039
  article-title: Secure and usable pin-entry method with shoulder-surfing resistance
  contributor:
    fullname: Lee
– volume: 66
  start-page: 115
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0060
  article-title: Draw-a-pin: authentication using finger-drawn pin on touch devices
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2017.01.008
  contributor:
    fullname: Van Nguyen
– volume: 56
  start-page: 140
  year: 2016
  ident: 10.1016/j.cose.2020.102116_bib0040
  article-title: Secure bimodal pin-entry method using audio signals
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2015.06.006
  contributor:
    fullname: Lee
– start-page: 268
  year: 2018
  ident: 10.1016/j.cose.2020.102116_bib0002
  article-title: Path word: a multimodal password entry method for ad-hoc authentication based on digits’ shape and smooth pursuit eye movements
  contributor:
    fullname: Almoctar
– start-page: e5549
  year: 2019
  ident: 10.1016/j.cose.2020.102116_bib0012
  article-title: Securing pin-based authentication in smartwatches with just two gestures
  publication-title: Concurr. Comput.
  contributor:
    fullname: Guerar
– start-page: 237
  year: 2015
  ident: 10.1016/j.cose.2020.102116_bib0059
  article-title: Tactile one-time pad: Leakage-resilient authentication for smartphones
  contributor:
    fullname: Uellenbeck
– start-page: 80
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0057
  article-title: Cursor masquerade: Masking of authentic cursor using random numeric keypad and spurious cursors
  contributor:
    fullname: Sugumar
– start-page: 1
  year: 2020
  ident: 10.1016/j.cose.2020.102116_bib0022
  article-title: Enhancing smartphone lock security using vibration enabled randomly positioned numbers
  contributor:
    fullname: Kabir
– start-page: 2749
  year: 2011
  ident: 10.1016/j.cose.2020.102116_bib0064
  article-title: Gaze-based password authentication through automatic clustering of gaze points
  contributor:
    fullname: Weaver
– start-page: 59
  year: 2016
  ident: 10.1016/j.cose.2020.102116_bib0065
  article-title: An observation attacks resistant pin-entry scheme using localized haptic feedback
  contributor:
    fullname: Xu
– volume: 9
  start-page: 777
  issue: 1
  year: 2019
  ident: 10.1016/j.cose.2020.102116_bib0020
  article-title: Gaze touch cross pin: Secure multimodal authentication using gaze and touch pin
  publication-title: Int. J. Eng. Adv. Technol. (IJEAT)
  doi: 10.35940/ijeat.A1381.109119
  contributor:
    fullname: Ibrahim
– start-page: 329
  year: 2019
  ident: 10.1016/j.cose.2020.102116_bib0030
  article-title: Touchgazepath: multimodal interaction with touch and gaze path for secure yet efficient pin entry
  contributor:
    fullname: Kumar
– start-page: 53
  year: 2018
  ident: 10.1016/j.cose.2020.102116_bib0048
  article-title: Spinpad: A secured pin number based user authentication scheme
  contributor:
    fullname: Rajarajan
– start-page: 89
  year: 2015
  ident: 10.1016/j.cose.2020.102116_bib0014
  article-title: Revisiting authentication with shoulder-surfing resistance for smartphones
  contributor:
    fullname: Higashiyama
– start-page: 26
  year: 2013
  ident: 10.1016/j.cose.2020.102116_bib0036
  article-title: Secure and fast pin-entry method for 3d display
  publication-title: Proceed. Securware
  contributor:
    fullname: Lee
– start-page: 1410
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0010
  article-title: A simple observation attacks resistant pin-entry scheme employing audios
  contributor:
    fullname: Dan
– start-page: 426
  year: 2015
  ident: 10.1016/j.cose.2020.102116_bib0050
  article-title: Safetypin: Secure pin entry through eye tracking
  contributor:
    fullname: Seetharama
– volume: 12
  start-page: 2875
  issue: 12
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0045
  article-title: Illusionpin: Shoulder-surfing resistant authentication using hybrid images
  publication-title: IEEE Trans. Inform. Forens. Secur.
  doi: 10.1109/TIFS.2017.2725199
  contributor:
    fullname: Papadopoulos
– start-page: 281
  year: 2015
  ident: 10.1016/j.cose.2020.102116_bib0066
  article-title: Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass
  contributor:
    fullname: Yadav
– start-page: 1
  year: 2012
  ident: 10.1016/j.cose.2020.102116_bib0063
  article-title: Cursorcamouflage: multiple dummy cursors as a defense against shoulder surfing
  contributor:
    fullname: Watanabe
– start-page: 1875
  year: 2016
  ident: 10.1016/j.cose.2020.102116_bib0008
  article-title: On designing leakage-resilient vibration based authentication techniques
  contributor:
    fullname: Chakraborty
– start-page: 351
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0035
  article-title: Reflector: Distance-independent, private pointing on a reflective screen
  contributor:
    fullname: Lee
– volume: 6
  start-page: 65
  issue: 2
  year: 2010
  ident: 10.1016/j.cose.2020.102116_bib0046
  article-title: SSSL: shoulder surfing safe login
  publication-title: J. Comm. Software
  doi: 10.24138/jcomss.v6i2.191
  contributor:
    fullname: Perković
– start-page: 1725
  year: 2013
  ident: 10.1016/j.cose.2020.102116_bib0041
  article-title: User authentication in a multi-touch surface: a chord password system
  contributor:
    fullname: Leftheriotis
– volume: 40
  start-page: 1
  year: 2018
  ident: 10.1016/j.cose.2020.102116_bib0056
  article-title: Incognito: Shoulder-surfing resistant selection method
  publication-title: J. inform. Secur. Applica.
  contributor:
    fullname: Still
– start-page: 102
  year: 2018
  ident: 10.1016/j.cose.2020.102116_bib0017
  article-title: Dynamic keypad–digit shuffling for secure pin entry in a virtual world
  contributor:
    fullname: Holland
– volume: 88
  start-page: 101647
  year: 2020
  ident: 10.1016/j.cose.2020.102116_bib0005
  article-title: A survey on smartphone user’s security choices, awareness and education
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2019.101647
  contributor:
    fullname: Breitinger
– start-page: 151
  year: 2019
  ident: 10.1016/j.cose.2020.102116_bib0029
  article-title: Efficient shoulder surfing resistant pin authentication scheme based on localized tactile feedback
  contributor:
    fullname: Ku
– volume: 3
  start-page: 356
  issue: 5
  year: 2015
  ident: 10.1016/j.cose.2020.102116_bib0015
  article-title: A password authentication method tolerant to video-recording attacks analyzing multiple authentication operations
  publication-title: Int. J. Comput. Sci. Electron. Eng. (IJCSEE)
  contributor:
    fullname: Hirakawa
– volume: 162
  start-page: 777
  issue: 11
  year: 2015
  ident: 10.1016/j.cose.2020.102116_bib0019
  article-title: The prisma extension statement for reporting of systematic reviews incorporating network meta-analyses of health care interventions: checklist and explanations
  publication-title: Ann. Internal Med.
  doi: 10.7326/M14-2385
  contributor:
    fullname: Hutton
– start-page: 1
  year: 2017
  ident: 10.1016/j.cose.2020.102116_bib0001
  article-title: Security enhancement in automated teller machine
  contributor:
    fullname: Adithya
– volume: 4
  start-page: 544
  year: 2018
  ident: 10.1016/j.cose.2020.102116_bib0061
  article-title: An efficient security key for practical requirement of pin entry protection section authentication
  publication-title: Int. J. Adv. Res. Ideas Innov. Technol.
  contributor:
    fullname: Vijai
– start-page: 207
  year: 2016
  ident: 10.1016/j.cose.2020.102116_bib0027
  article-title: Use the force: Evaluating force-sensitive authentication for mobile devices
  contributor:
    fullname: Krombholz
– start-page: 1
  year: 2009
  ident: 10.1016/j.cose.2020.102116_bib0054
  article-title: A rotary pin entry scheme resilient to shoulder-surfing
  contributor:
    fullname: Shi
– volume: 7
  start-page: 124366
  year: 2019
  ident: 10.1016/j.cose.2020.102116_bib0009
  article-title: On overcoming the identified limitations of a usable pin entry method
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2937948
  contributor:
    fullname: Chakraborty
– start-page: 1403
  year: 2015
  ident: 10.1016/j.cose.2020.102116_bib0062
  article-title: Swipin: fast and secure pin-entry on smartphones
  contributor:
    fullname: Von Zezschwitz
SSID ssj0017688
Score 2.420296
SecondaryResourceType review_article
Snippet •First systematic review on PIN-entry methods resistant to shoulder-surfing attack.•A taxonomy of PIN-entry methods resistant to shoulder-surfing attack is...
SourceID crossref
elsevier
SourceType Aggregation Database
Publisher
StartPage 102116
SubjectTerms Authentication
Observation attack
Password
PIN
Recording attack
Shoulder surfing
Title A systematic review of PIN-entry methods resistant to shoulder-surfing attacks
URI https://dx.doi.org/10.1016/j.cose.2020.102116
Volume 101
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV25TsNAEB3laGi4EeGItqBDS3x7U0YRUQCRBiKls_YUoXCi2Gn5dmbtdQAJUdDGGcl6Xs-bkd_MA7hhkoWKC0W5MsYu1RaUCRZRHg_9UEgu_MqS5XmWTOfR4yJetGDczMJYWaXL_XVOr7K1-2Xg0Bysl8vBSyWgxwMY4DlF2mVt6CIdRVEHuqOHp-ls9zEBK2q2W_GNAW52ppZ5WVk4tolBtcTAt7bnv_HTN86ZHMK-KxbJqL6fI2jp_BgOGiMG4t7LE5iNyNdGZlJPo5CVIdiy08o5hNRG0QVeK2zBmJekXJHizfpb6w0tthuDFEZ4WdqR-1OYT-5fx1PqjBKoDD2vpImImUl4yIwyvmdS7SHEMrXueyKRPNBDiW1ZEvs6EVjQpYFSSOxpmCotNdZg4Rl08lWuz4EEjKtEIbHh_7DX05gLpS9CDLKGwMb04LaBJ1vX-zCyRij2nlkwMwtmVoPZg7hBMPvxVDNM2H_EXfwz7hL2Aqs5qVTVV9ApN1t9jUVDKfrQvvvw--5ofAJWd8BQ
link.rule.ids 315,786,790,4521,24144,27957,27958,45620,45714
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV25TsNAEB2FUEDDjQjnFnRoiY_Y3pRRBAqQpCGR0q32FKFwothp-XZmfQSQEAWtvStZz7szb6Q38wBumWKhFlJToa11Q7UlZZJ1qIi6fiiVkH5hyTIax4Np53kWzRrQr3thnKyyiv1lTC-idfWkXaHZXs7n7ddCQI8HMMBzimmXbcG2o_POv-H-Y6Pz8JFPs82Ab1xedc6UIi8nCsciMShGGPjO9Py37PQt4zwewF5FFUmv_JpDaJj0CPZrGwZS3cpjGPfI1zxmUvaikIUlWLDTwjeElDbRGb7LHF1Mc5IvSPbm3K3NimbrlcUERkSeu4b7E5g-Pkz6A1rZJFAVel5OYxkxG4uQWW19zybGQ4BV4rz3ZKxEYLoKi7I48k0skc4lgdaY1pMw0UYZZGDhKTTTRWrOgARM6FhjWsN1WOkZjITKlyFucnbA1rbgroaHL8tpGLyWib1zByZ3YPISzBZENYL8xz_lGK7_2Hf-z303sDOYjIZ8-DR-uYDdwKlPCn31JTTz1dpcIX3I5XVxPD4B9AbBHg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+systematic+review+of+PIN-entry+methods+resistant+to+shoulder-surfing+attacks&rft.jtitle=Computers+%26+security&rft.au=Binbeshr%2C+Farid&rft.au=Mat+Kiah%2C+M.L.&rft.au=Por%2C+Lip+Yee&rft.au=Zaidan%2C+A.A.&rft.date=2021-02-01&rft.pub=Elsevier+Ltd&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=101&rft_id=info:doi/10.1016%2Fj.cose.2020.102116&rft.externalDocID=S0167404820303898
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon