S Mare, R Rawassizadeh, R Peterson, D Kotz - 2018 - core.ac.uk
Authentication has become an integral part of computer usage, but it still remains an interruptive step in people's workflow. To authenticate to a computer, depending on the …
S Mare, R Rawassizadeh… - … of the ACM on …, 2018 - digitalcommons.dartmouth.edu
Token-based proximity authentication methods that authenticate users based on physical proximity are effortless, but lack explicit user intentionality, which may result in accidental …
S MARE, R RAWASSIZADEH, R PETERSON, D KOTZ - 2018 - cs.dartmouth.edu
Authentication has become an integral part of computer usage, but it still remains an interruptive step in people's workflow. To authenticate to a computer, depending on the …
S Mare, R Rawassizadeh, R Peterson, D Kotz - 2018 - scholar.archive.org
Authentication has become an integral part of computer usage, but it still remains an interruptive step in people's workflow. To authenticate to a computer, depending on the …
S MARE, R RAWASSIZADEH, R PETERSON, D KOTZ - 2018 - cs.dartmouth.edu
Authentication has become an integral part of computer usage, but it still remains an interruptive step in people's workflow. To authenticate to a computer, depending on the …
S MARE, R RAWASSIZADEH, R PETERSON, D KOTZ - 2018 - shrirangmare.com
Authentication has become an integral part of computer usage, but it still remains an interruptive step in people's workflow. To authenticate to a computer, depending on the …
S MARE, R RAWASSIZADEH, R PETERSON, D KOTZ - 2018 - cs.dartmouth.edu
Authentication has become an integral part of computer usage, but it still remains an interruptive step in people's workflow. To authenticate to a computer, depending on the …