Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Smudge attack

A smudge attack is a method to discern the password pattern of a touchscreen device such as a cell phone or tablet computer. The method was… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Nowadays text-based password has been widely used in our daily life. However, rather than choose a complex text password people… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2018
2018
The dynamic keypad security system is designed and implemented in this study to demonstrate a possibility to overcome the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
2016
2016
Graphical patterns are widely used for authentication in touch screen phones. When a user enters a pattern on a touch screen… Expand
2013
2013
As cities continue to compete for regional and global primacy, governments around the world have drawn upon a series of… Expand
  • figure 3.1
  • figure 4.1
  • figure 4.2
  • figure 4.3
  • table 5.1
2013
2013
Background: Leukemias are malign neoplasias of the hematopoietic precursor cells from the bone marrow. These neoplastic cells may… Expand
Highly Cited
2010
Highly Cited
2010
Touch screens are an increasingly common feature on personal computing devices, especially smartphones, where size and user… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2008
2008
The northern fringe of the Gulf of Mexico has an excellent climate for growing high-quality satsumas that are available in U.S… Expand
2007
2007
gurgles white gouts. Behind the buggy edges fraying the green, the darkness switches on. Solid as cups of buttermilk they stand… Expand
2005
2005
  • 2005
  • Corpus ID: 38727099
Distinguished by their naked amorphous nuclear chromatin material, smudge cells were initially described by Gumprecht in 1896 as… Expand
  • table 1
  • figure 3
2003
2003