Show
ABSTRACTPeople use their mobile devices anywhere and anytime to run various apps, and the information shown on their device screens can be seen by nearby (unauthorized) parties, called shoulder surfers. To mitigate this privacy threat, we have developed HideScreen by utilizing the human vision and optical system properties to hide the users' on-screen information from the shoulder surfers. Specifically, HideScreen discretizes the device screen into grid patterns to neutralize the low-frequency components so that the on-screen information will "blend into'' the background when viewed from the outside of the designed range. We have developed and evaluated several ways of hiding both on-screen texts and images from shoulder surfers. Our extensive experimental evaluation of HideScreen demonstrates its high protection rates (>96% for texts and >99% for images) while providing good user experience. References
Index Terms
Login optionsCheck if you have access through your login credentials or your institution to get full access on this article. Sign in Full Access
PDF FormatView or Download as a PDF file. eReaderView online with eReader. eReader What is the most important reason you should not attempt to fix a hacked computer device or work account by yourself?If the computer you are using was provided to you by your employer or is used for work, do not try to fix your computer yourself and do not turn the computer off. You may cause more harm than good and you could destroy valuable evidence that can be used for an investigation.
Which of the following is the best way to create a strong password quizlet?Terms in this set (6). Never use personal information. Never use personal information such as your name, birthday, or spouse's name. ... . Use a longer password. Use a longer password. ... . Don't use the same password for each account. ... . Keep them in a secure place. ... . Numbers, symbols, uppercase and lowercase letters. ... . Weak password.. Why is it important to use a strong unique passphrase for each of your social networking accounts?If the password is reused, they can gain access to further accounts. This is why unique passwords are so important. Additionally, when hackers can't easily find or a guess the password, they may use a technique called brute forcing.
How do spear phishing attacks differ from standard phishing attacks quizlet?Phishing attacks pretends to be from a company the user does business with or from another seemingly trustworthy source. However, it is really an attacker. Spear phishing attacks are when the attacker personalizes the email message to a particular person.
|