Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication
Android pattern lock is still popularly used for mobile user authentication. Unfortunately, however, many concerns have been raised regarding its security and usability. User-created patterns tend to be simply structured or reduced to a small set. Complex patterns are hard to memorize. Input pattern...
Main Authors: | Yeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8721054/ |
Similar Items
-
Analysis of user behavior and authorization methods in context of mobile devices security
by: Piotr Król, et al.
Published: (2018-03-01) -
Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks
by: Sooyeon Shin, et al.
Published: (2018-01-01) -
Efficient Protection of Android Applications through User Authentication Using Peripheral Devices
by: Jinseong Kim, et al.
Published: (2018-04-01) -
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things
by: Sooyeon Shin, et al.
Published: (2020-01-01) -
System and hardware security options available for users on devices running Android operating system
by: Tomasz Borysiewicz
Published: (2018-11-01)