
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Shoulder surfing experiments: A systematic literature review
Leon Bošnjak, Boštjan Brumen
Computers & Security (2020) Vol. 99, pp. 102023-102023
Open Access | Times Cited: 35
Leon Bošnjak, Boštjan Brumen
Computers & Security (2020) Vol. 99, pp. 102023-102023
Open Access | Times Cited: 35
Showing 1-25 of 35 citing articles:
A Review on Secure Authentication Mechanisms for Mobile Security
Syed Shabih Hasan, Anwar Ghani, Ali Daud, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 700-700
Open Access
Syed Shabih Hasan, Anwar Ghani, Ali Daud, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 700-700
Open Access
PassNum: A usable and secure method against repeated shoulder surfing
Awais Ahmad, Muhammad Asif, Isma Hamid, et al.
Behaviour and Information Technology (2025), pp. 1-27
Closed Access
Awais Ahmad, Muhammad Asif, Isma Hamid, et al.
Behaviour and Information Technology (2025), pp. 1-27
Closed Access
Virtual Reality Observations: Using Virtual Reality to Augment Lab-Based Shoulder Surfing Research
Florian Mathis, Joseph O’Hagan, Mohamed Khamis, et al.
2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR) (2022)
Open Access | Times Cited: 14
Florian Mathis, Joseph O’Hagan, Mohamed Khamis, et al.
2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR) (2022)
Open Access | Times Cited: 14
Prototyping Usable Privacy and Security Systems: Insights from Experts
Florian Mathis, Kami Vaniea, Mohamed Khamis
International Journal of Human-Computer Interaction (2021) Vol. 38, Iss. 5, pp. 468-490
Open Access | Times Cited: 19
Florian Mathis, Kami Vaniea, Mohamed Khamis
International Journal of Human-Computer Interaction (2021) Vol. 38, Iss. 5, pp. 468-490
Open Access | Times Cited: 19
Preventing Shoulder Surfing Attacks_Matrix Based Graphical Technique
Ashtha Goyal, Priya Matta, Yogesh Lohumi
(2024), pp. 53-58
Closed Access | Times Cited: 2
Ashtha Goyal, Priya Matta, Yogesh Lohumi
(2024), pp. 53-58
Closed Access | Times Cited: 2
Understanding Shoulder Surfer Behavior and Attack Patterns Using Virtual Reality
Yasmeen Abdrabou, Radiah Rivu, Tarek Ammar, et al.
(2022), pp. 1-9
Open Access | Times Cited: 10
Yasmeen Abdrabou, Radiah Rivu, Tarek Ammar, et al.
(2022), pp. 1-9
Open Access | Times Cited: 10
Human Factors in Privacy Research
Nina Gerber, Alina Stöver, Karola Marky
Springer eBooks (2023)
Closed Access | Times Cited: 5
Nina Gerber, Alina Stöver, Karola Marky
Springer eBooks (2023)
Closed Access | Times Cited: 5
The Interplay between Personal Relationships & Shoulder Surfing Mitigation
Habiba Farzand, Kinshuk Bhardwaj, Karola Marky, et al.
(2021)
Open Access | Times Cited: 8
Habiba Farzand, Kinshuk Bhardwaj, Karola Marky, et al.
(2021)
Open Access | Times Cited: 8
AlignPIN: Indirect PIN Selection For Protection Against Repeated Shoulder Surfing
Shreyans Jain, Shristi Dabola, Shikhar Binjola, et al.
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2021) Vol. 1 0, pp. 594-599
Closed Access | Times Cited: 6
Shreyans Jain, Shristi Dabola, Shikhar Binjola, et al.
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2021) Vol. 1 0, pp. 594-599
Closed Access | Times Cited: 6
SmartGP: A Framework for a Two-Factor Graphical Password Authentication Using Smart Devices
Palash Ray, Rajesh Mukherjee, Debasis Giri, et al.
Lecture notes in networks and systems (2023), pp. 231-240
Closed Access | Times Cited: 2
Palash Ray, Rajesh Mukherjee, Debasis Giri, et al.
Lecture notes in networks and systems (2023), pp. 231-240
Closed Access | Times Cited: 2
Information Security Awareness Raising Strategy Using Fuzzy AHP Method with HAIS-Q and ISO/IEC 27001:2013: A Case Study of XYZ Financial Institution
Yohan Adhi Styoutomo, Yova Ruldeviyani
CommIT (Communication and Information Technology) Journal (2023) Vol. 17, Iss. 2, pp. 133-149
Open Access | Times Cited: 2
Yohan Adhi Styoutomo, Yova Ruldeviyani
CommIT (Communication and Information Technology) Journal (2023) Vol. 17, Iss. 2, pp. 133-149
Open Access | Times Cited: 2
SelfiePass: A Shoulder Surfing Resistant Graphical Password Scheme
S. Rajarajan, P. L. K. Priyadarsini
(2021)
Closed Access | Times Cited: 5
S. Rajarajan, P. L. K. Priyadarsini
(2021)
Closed Access | Times Cited: 5
PIN Scrambler: Assessing the Impact of Randomized Layouts on the Usability and Security of PINs
Daniel Kirkwood, Cagdas Tombul, Calum Firth, et al.
(2022), pp. 83-88
Open Access | Times Cited: 3
Daniel Kirkwood, Cagdas Tombul, Calum Firth, et al.
(2022), pp. 83-88
Open Access | Times Cited: 3
Development of a Matrix-style Pressure sensing Pin-Pad Module with Tactile Feedback
Hsu-Feng Chang, Shyang-Jye Chang
Sensors and Actuators A Physical (2024) Vol. 376, pp. 115572-115572
Closed Access
Hsu-Feng Chang, Shyang-Jye Chang
Sensors and Actuators A Physical (2024) Vol. 376, pp. 115572-115572
Closed Access
Graphical User Authentication Algorithms Based on Recognition
Zena M. Saadi, Ahmed T. Sadiq, Omar Z. Akif
ARO-The Scientific Journal of Koya University (2024) Vol. 12, Iss. 2, pp. 79-93
Open Access
Zena M. Saadi, Ahmed T. Sadiq, Omar Z. Akif
ARO-The Scientific Journal of Koya University (2024) Vol. 12, Iss. 2, pp. 79-93
Open Access
Social Engineering Shoulder Surfing Attacks (SSAs): A Literature Review. Lessons, Challenges, and Future Directions
Bryan Zurita, Santiago Bosque, Walter Fuertes, et al.
Communications in computer and information science (2024), pp. 220-233
Closed Access
Bryan Zurita, Santiago Bosque, Walter Fuertes, et al.
Communications in computer and information science (2024), pp. 220-233
Closed Access
Real-time siamese neural network based algorithm for user recognition by their eye blinking
Kamil Malinowski, Khalid Saeed
Research Square (Research Square) (2024)
Open Access
Kamil Malinowski, Khalid Saeed
Research Square (Research Square) (2024)
Open Access
Occupying Another’s Digital Space: Privacy of Smartphone Users as a Situated Practice
Iuliia Avgustis, Samira Ibnelkaïd, Netta Iivari
Computer Supported Cooperative Work (CSCW) (2024)
Open Access
Iuliia Avgustis, Samira Ibnelkaïd, Netta Iivari
Computer Supported Cooperative Work (CSCW) (2024)
Open Access
A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments
Brittany Lewis, Priyankan Kirupaharan, Tina-Marie Ranalli, et al.
ACM Transactions on Accessible Computing (2024) Vol. 17, Iss. 2, pp. 1-37
Open Access
Brittany Lewis, Priyankan Kirupaharan, Tina-Marie Ranalli, et al.
ACM Transactions on Accessible Computing (2024) Vol. 17, Iss. 2, pp. 1-37
Open Access
Siamese neural network based algorithm for user recognition by their eye blinking
Kamil Malinowski, Khalid Saeed
Research Square (Research Square) (2024)
Open Access
Kamil Malinowski, Khalid Saeed
Research Square (Research Square) (2024)
Open Access
A Random and Unselectable Graphic Password Scheme
Kanghong Wang
2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) (2024), pp. 41-46
Closed Access
Kanghong Wang
2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) (2024), pp. 41-46
Closed Access
A Systematic Review of Graphical PasswordMethods Resistant to Shoulder-surfing Attacks
Farid Binbeshr, Khaw Chee Siong, Lip Yee Por, et al.
Research Square (Research Square) (2024)
Open Access
Farid Binbeshr, Khaw Chee Siong, Lip Yee Por, et al.
Research Square (Research Square) (2024)
Open Access
A systematic review of graphical password methods resistant to shoulder-surfing attacks
Farid Binbeshr, Khaw Chee Siong, Lip Yee Por, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Farid Binbeshr, Khaw Chee Siong, Lip Yee Por, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
RISET: Secure Eye-Tracking Password Authentication with Random Image Sequence
Pramudya Tiandana Wisnu Gautama, Tohari Ahmad
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023)
Closed Access | Times Cited: 1
Pramudya Tiandana Wisnu Gautama, Tohari Ahmad
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023)
Closed Access | Times Cited: 1
Vibration-Based Pattern Password Approach for Visually Impaired People
Suliman A. Alsuhibany
Computer Systems Science and Engineering (2021) Vol. 40, Iss. 1, pp. 341-356
Open Access | Times Cited: 3
Suliman A. Alsuhibany
Computer Systems Science and Engineering (2021) Vol. 40, Iss. 1, pp. 341-356
Open Access | Times Cited: 3