Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method

Article English OPEN
Andriotis, P.; Tryfonas, T.; Oikonomou, G.;
  • Publisher: Springer-Verlag

One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system. In this paper we investigate the impact of password strength meters on the selection of a perc... View more
  • References (17)
    17 references, page 1 of 2

    1. P. Andriotis, T. Tryfonas, G. Oikonomou, and C. Yildiz.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: 6th ACM conference on Security and privacy in wireless and mobile networks, WiSec13, pp. 1 - 6. ACM, (2013)

    2. I. G. Askoxylakis, D. D. Kastanis, and A. Traganitis.: Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks. In: Communication, Network, and Information Security, pp. 50 - 60, (2006)

    3. A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith.: Smudge attacks on smartphone touch screens. In: 4th USENIX conference on O↵ensive technologies, pp. 1 7, USENIX Association, (2010)

    4. R. Biddle, S. Chiasson, and P. C. Van Oorschot.: Graphical passwords: Learning from the first twelve years. ACM Computing Surveys, 44 (4) : 141, (2012)

    5. J. Bonneau.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: Security and Privacy (SP), 2012 IEEE Symposium, pp. 538 - 552, IEEE, (2012)

    6. S. Brosto↵ and A. Sasse.: Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In: People and Computers XIVUsability or Else!, pp. 405 - 424, Springer London, (2000)

    7. D. Davis, F. Monrose, and M. Reiter.: On user choice in graphical password schemes. In: USENIX Assosiation Proceedings of the 13th USENIX Security Symposium, pp. 151 163, USENIX Association, (2004)

    8. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin.: The Design and Analysis of Graphical Passwords. In: 8th USENIX Security Symposium, pp. 1 - 14, (1999)

    9. Passfaces Corporation.: The Science Behind Passfaces. White paper, available at papers.htm.

    10. Solar Designer. John the Ripper. Online at

  • Related Organizations (4)
  • Metrics
Share - Bookmark