Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Smudge attack

A smudge attack is a method to discern the password pattern of a touchscreen device such as a cell phone or tablet computer. The method was… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The dynamic keypad security system is designed and implemented in this study to demonstrate a possibility to overcome the… 
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
2016
2016
Graphical patterns are widely used for authentication in touch screen phones. When a user enters a pattern on a touch screen… 
2013
2013
As cities continue to compete for regional and global primacy, governments around the world have drawn upon a series of… 
  • figure 3.1
  • figure 4.1
  • figure 4.2
  • figure 4.3
  • table 5.1
Highly Cited
2010
Highly Cited
2010
Touch screens are an increasingly common feature on personal computing devices, especially smartphones, where size and user… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2008
2008
The northern fringe of the Gulf of Mexico has an excellent climate for growing high-quality satsumas that are available in U.S… 
2008
2008
Factors that determine when and to what extent a plant will freeze are complex. Although thermocouples have served as the main… 
  • figure I
  • figure 2
  • figure 3
  • figure 4
2007
2007
gurgles white gouts. Behind the buggy edges fraying the green, the darkness switches on. Solid as cups of buttermilk they stand… 
2003
1992
1992
On the back yard of our parish lot is a patch of ground I drive by every day. It is the place where we have a bonfire of trees… 
1990