Author:
Ibrahim Nasir,Sellahewa Harin
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference46 articles.
1. Andriotis, P., Tryfonas, T., Oikonomou, G.: Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method, in human aspects of information security. Privacy Trust 8533, 115–126 (2014)
2. Andriotis, P., Oikonomou, G., Mylonas, A., Tryfonas, T.: A study on usability and security features of the android pattern lock screen. Inf. Comput. Secur. 24, 53–72 (2016)
3. Andriotis, P., Kirby, M., Takasu, A.: Bu-dash: a universal and dynamic graphical password scheme. In: Moallem, A. (ed.) HCI for Cybersecurity. Privacy and Trust, pp. 209–227. Springer, Cham (2022)
4. Angulo, J., Wästlund, E.: Exploring touch-screen biometrics for user identification on smart phones. In: Privacy and Identity Management for Life, pp. 130–143 (2012)
5. Armstrong, R.A.: When to use the Bonferroni correction. Ophthalmic Physiol. Opt. 34(5), 502–508 (2014)