Abstract is missing.
- Recovering High-Value Secrets with SGX and Social AuthenticationNathan Malkin, Serge Egelman, David Wagner. [doi]
- Examining Visual-Spatial Paths for Mobile AuthenticationDavid Lu, Taehoon Lee, Sauvik Das, Jason I. Hong. [doi]
- Advancing the Understanding of Android Unlocking and UsageLina Qiu, Ildar Muslukhov, Konstantin Beznosov. [doi]
- Who Are You? It Depends (On What You Ask Me!): Context-Dependent Dynamic User AuthenticationRaghav V. Sampangi, Kirstie Hawkey. [doi]
- Who Are You Now? Fading to Multiple PersonasSven Dietrich, Michael Brenner, Katharina Krombholz. [doi]
- Implications of the Use of Emojis in Mobile AuthenticationLydia Kraus, Robert Schmidt, Marcel Walch, Florian Schaub, Christopher Krügelstein, Sebastian Möller. [doi]
- Picking a (Smart)Lock: Locking Relationships on Mobile DevicesElizabeth Stobert, David Barrera. [doi]
- Strengthening Password-based AuthenticationScott Ruoti, Jeff Andersen, Kent E. Seamons. [doi]
- Exploring Games for Improved Touchscreen Authentication on Mobile DevicesPadmaja Scindia, Jonathan Voris. [doi]
- Lessons Learned from Designing and Evaluating Smart Device-based Authentication for Visually Impaired UsersNatã Miccael Barbosa, Yang Wang 0005. [doi]
- Social Authentication for End-to-End EncryptionElham Vaziripour, Mark O'Neill, Justin Wu, Scott Heidbrink, Kent E. Seamons, Daniel Zappala. [doi]
- Authentication Feature and Model Selection using Penalty AlgorithmsRahul Murmuria, Angelos Stavrou. [doi]
- Effect of Cognitive Effort on Password ChoiceThomas Groß, Kovila P. L. Coopamootoo, Amina Al-Jabri. [doi]
- Position Paper: Measuring the Impact of Alphabet and Culture on Graphical PasswordsAdam J. Aviv, Markus Dürmuth, Payas Gupta. [doi]
- Standard Metrics and Scenarios for Usable AuthenticationScott Ruoti, Kent E. Seamons. [doi]