ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.04868
  4. Cited By
This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone
  Unlock PINs
v1v2v3 (latest)

This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs

10 March 2020
Philipp Markert
D. Bailey
Maximilian Golla
Markus Dürmuth
Adam J. Aviv
    PILM
ArXiv (abs)PDFHTML

Papers citing "This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs"

11 / 11 papers shown
Title
Exploring Reliable PPG Authentication on Smartwatches in Daily Scenarios
Exploring Reliable PPG Authentication on Smartwatches in Daily Scenarios
J. Tang
Jiacheng Liu
Renling Tong
Kai Zhu
Zhe Li
Xin Yi
Junliang Xing
Yuanchun Shi
Yansen Wang
383
0
0
31 Mar 2025
Smartphone-based Iris Recognition through High-Quality Visible Spectrum
  Iris Capture
Smartphone-based Iris Recognition through High-Quality Visible Spectrum Iris Capture
Naveenkumar G. Venkataswamy
Yu Liu
Surendra Singh
Soumyabrata Dey
Stephanie Schuckers
Masudul H. Imtiaz
69
0
0
17 Dec 2024
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems
M. Casagrande
Riccardo Cestaro
E. Losiouk
Mauro Conti
Daniele Antonioli
113
0
0
26 Nov 2024
IFTT-PIN: A Self-Calibrating PIN-Entry Method
IFTT-PIN: A Self-Calibrating PIN-Entry Method
Kathryn McConkey
Talha Enes Ayranci
Mohamed Khamis
Jonathan Grizou
16
1
0
02 Jul 2024
SoK: Web Authentication in the Age of End-to-End Encryption
SoK: Web Authentication in the Age of End-to-End Encryption
Jenny Blessing
Daniel Hugenroth
Ross J. Anderson
A. Beresford
79
1
0
26 Jun 2024
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our
  Password Hash Without Learning the Hash Value or the Cleartext
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext
Norbert Tihanyi
Tamás Bisztray
B. Borsos
Sebastien Raveau
15
2
0
14 Jun 2023
SoK: Cryptographic Confidentiality of Data on Mobile Devices
SoK: Cryptographic Confidentiality of Data on Mobile Devices
Maximilian Zinkus
Tushar M. Jois
M. Green
19
7
0
22 Sep 2021
"I have no idea what they're trying to accomplish:" Enthusiastic and
  Casual Signal Users' Understanding of Signal PINs
"I have no idea what they're trying to accomplish:" Enthusiastic and Casual Signal Users' Understanding of Signal PINs
D. Bailey
Philipp Markert
Adam J. Aviv
41
11
0
16 Jun 2021
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited:
  A Holistic View of PIN Authentication in Digital Lives and Beyond
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond
Hassan Khan
Jason Ceci
Jonah Stegman
Adam J. Aviv
R. Dara
Ravi Kuber
34
9
0
24 Aug 2020
Double Patterns: A Usable Solution to Increase the Security of Android
  Unlock Patterns
Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns
Timothy Forman
Adam J. Aviv
10
16
0
24 Aug 2020
Knock, Knock. Who's There? On the Security of LG's Knock Codes
Knock, Knock. Who's There? On the Security of LG's Knock Codes
Raina Samuel
Philipp Markert
Adam J. Aviv
Iulian Neamtiu
13
10
0
05 Jun 2020
1