Thursday, 10 September 2015

Techniques to prevent shoulder surfing

Shoulder Surfing 

In computer security, shoulder surfing refers to using direct observation techniques, such as looking over someone’s shoulder, to get information. Shoulder surfing is particularly effective in crowded places because it’s relatively easy to observe someone as they enter passwords on a computer, fill out a form or enter their PIN at an automated teller machine (ATM).
Shoulder surfing can also be done at a distance using binoculars or other vision-enhancing devices. Inexpensive, miniature closed circuit television cameras can be concealed in ceilings, walls or fixtures to observe data entry.
To prevent shoulder surfing, these papers describe some techniques:
  1. http://www.ijsrp.org/research_paper_dec2011/ijsrp-dec-2011-08.pdf
  2. http://www.ijarcce.com/upload/2015/march-15/IJARCCE%2087.pdf
  3. http://ijsetr.org/wp-content/uploads/2015/02/IJSETR-VOL-4-ISSUE-2-330-335.pdf
  4. http://research.ijcaonline.org/volume114/number19/pxc3902031.pdf
  5. http://ijarcsms.com/docs/paper/volume2/issue10/V2I10-0058.pdf
  6. http://www.ijera.com/papers/Vol5_issue3/Part%20-%205/M503056064.pdf
  7. http://esatjournals.org/Volumes/IJRET/2015V04/I01/IJRET20150401008.pdf
  8. http://ijartet.com/papers/NCRIT15/V02S170327.pdf
  9. http://www.ijrdet.com/files/Volume2Issue4/IJRDET_0414_23.pdf
  10. http://www.ijert.org/view-pdf/4591/an-authentication-system-for-information-security-using-cued-click-point-and-one-time-session-key
  11. http://www.ijcsit.com/docs/Volume%205/vol5issue02/ijcsit20140502293.pdf
  12. http://www.hindawi.com/journals/tswj/2014/838623/

  13. https://cups.cs.cmu.edu/soups/2011/proceedings/a6_Zakaria.pdf
  14. http://www.rroij.com/open-access/implementing-black-hole-password-entrytechnique-for-mitigating-shouldersurfing-threat.pdf
  15. http://www.jetir.org/papers/JETIR1407015.pdf

No comments:

Post a Comment