Funder
National Natural Science Foundation of China
Open Research Fund of the State Key Laboratory of Integrated Services Networks
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Computer Science Applications,Human-Computer Interaction
Reference22 articles.
1. Andriotis, P., Oikonomou, G., Mylonas, A., et al.: A study on usability and security features of the Android pattern lock screen. Inf. Comput. Secur. 24, 53–72 (2016)
2. Andriotis, P., Oikonomou, G., Mylonas, A., et al.: A study on usability and security features of the Android pattern lock screen. Inf. Comput. Secur. 24(1), 53–72 (2016)
3. Binbeshr, F., Kiah, M., Por, Y.L., Zaidan, A.A.: A systematic review of pin-entry methods resistant to shoulder-surfing attacks. Comput. Secur. 101, 1–14 (2020)
4. Feng, T., Yang, J., Yan, Z., et al.: TIPS: context-aware implicit user identification using touch screen in uncontrolled environments. In: Workshop on Mobile Computing Systems & Applications, pp. 1–6. ACM (2014)
5. Gui-song, Y.A.N.G., Han-qing, L.I., Xing-yu, H.E.: Incentive mechanism based on user collaboration pair for mobile crowd sensing. J. Chin. Comput. Syst. 43(7), 1401–1405 (2022)