Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2019-03-07 09:30 |
Tokyo |
University of Electro-Communications |
Password for Prevention of Shoulder Surfing by Rear-Facing Camera Shota Ushiyachi, Ryuya Uda (Tokyo Univ. of Tech.) IT2018-75 ISEC2018-81 WBS2018-76 |
Mobile devices such as smart phones often manage privacy and secret information. Existing screen lock methods without bi... [more] |
IT2018-75 ISEC2018-81 WBS2018-76 pp.1-6 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:00 |
Yamaguchi |
|
Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing Motoi Tanaka, Hiroyuki Inaba (KIT) ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 |
A personal authentication system using PIN or password is widely used in various information terminals. However these au... [more] |
ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 pp.29-32 |
BioX, ITE-ME, ITE-IST |
2015-06-30 11:30 |
Ishikawa |
Kanazawa University, Kakuma Campus |
A Further Approach toward Pattern Lock Resistant against Shoulder Surfing So Higashikawa, Tomoaki Kosugi, Masahiro Mambo (Kanazawa Univ.) BioX2015-12 |
Mobile terminals adopt a login authentication called pattern lock, which achieves both high resistance to brute force at... [more] |
BioX2015-12 pp.85-89 |
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2015-02-23 16:40 |
Hokkaido |
Hokkaido Univ. |
Authentication Method against Shoulder-Surfing Attacks using Secondary Channel Akira Aratani, Atsushi Kanai (Hosei Univ.) |
(To be available after the conference date) [more] |
|
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 13:50 |
Hokkaido |
San-Refure Hakodate |
A proposal of authentication methods against shoulder surfing using a sub channel Akira Aratani, Atsushi Kanai (Hosei Univ.) ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22 |
The compromise of personal information has become a social problem as the rapid spread of smart phones and tablet-type d... [more] |
ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22 pp.139-144 |
BioX, ITE-ME, ITE-IST [detail] |
2014-06-16 13:00 |
Ishikawa |
Kanazawa University, Kakuma Campus |
A Study of Recording Attack Resistance of the Puzzle Authentication Yoshihiro Kita, Mirang Park (KAIT), Naonobu Okazaki (Univ. of Miyazaki) BioX2014-1 |
Recently, mobile terminals such as smartphones have come into widespread use. Most of such mobile terminals store severa... [more] |
BioX2014-1 pp.1-5 |
HCGSYMPO (2nd) |
2012-12-10 - 2012-12-12 |
Kumamoto |
Kumamoto-Shintoshin-plaza |
A Rhythm Authentication Method for Smartphone Ryota Ichimura, Atsuhiro Noguchi, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (International University of Health and Welfare) |
In this study, we have developed and proposed a secure and useful authentication method to resist 'shoulder surfing' att... [more] |
|
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 14:30 |
Akita |
Akita University |
Proposal on Password Authentication Against Iterative Shoulder Surfing Ryota Kitabayashi, Hiroyuki Inaba (KIT) ISEC2009-18 SITE2009-10 ICSS2009-32 |
Personal identification is one of the essential technology in order to
construct a secure information oriented society... [more] |
ISEC2009-18 SITE2009-10 ICSS2009-32 pp.21-26 |