A new authentication approach for people with upper extremity impairment

B Lewis, J Hebert… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
… Our goal in this paper is to explore an authentication approach for HMDs that is specifically
… of the disability of people with UEI, we have designed an authentication approach that does …

“I... Got my Nose-Print. But it Wasn't Accurate”: How People with Upper Extremity Impairment Authenticate on their Personal Computing Devices

B Lewis, K Venkatasubramanian - … of the 2021 CHI Conference on …, 2021 - dl.acm.org
… done with respect to authentication and people with disabilities. This research can … methods
during authentication, novel methods for the credential verifcation stage of the authentication

[图书][B] Designing Accessible Computing Device Authentication for People With Upper Extremity Impairment

B Lewis - 2023 - search.proquest.com
… to understand the authentication process used by people with upper extremity impairment
(UEI). A … credential verification methods during authentication, novel methods for the credential …

Disabilities and authentication methods: Usability and security

K Helkala - … Conference on Availability, Reliability and Security, 2012 - ieeexplore.ieee.org
… , vision impairment and upper extremity disabilities affect both the security and usability of
different authentication mechanisms. We use the method of ranking authentication products [22…

Allowing for secure and accessible authentication for individuals with disabilities of dexterity

A Price, F Loizides - International Conference on Human-Centred Software …, 2024 - Springer
… For PIN, password, one-time code and code-via-SMS methods of authentication, the
security of individuals with Parkinson’s and upper extremity disabilities is uniformly easier to …

Accessible authentication: Assessing the applicability for users with disabilities

S Furnell, K Helkala, N Woods - Computers & security, 2022 - Elsevier
… , we look at the available authentication methods and specifically at authentication from the
… neck region, shoulder region and in upper extremities. The ability to undertake multiple tasks …

A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments

B Lewis, P Kirupaharan, TM Ranalli… - ACM Transactions on …, 2024 - dl.acm.org
… Consequently, in this article we aim to develop an authentication approach for people with
UEI that is: secure, usable (in terms of not requiring dexterous use of one's upper extremities), …

Check for Allowing for Secure and Accessible Authentication for Individuals with Disabilities of Dexterity

A Price, F Loizides - Human-Centered Software Engineering: 10th IFIP … - books.google.com
… For PIN, password, one-time code and code-viaSMS methods of authentication, the
security of individuals with Parkinson’s and upper extremity disabilities is uniformly easier to …

A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - Proceedings of the 22nd …, 2020 - dl.acm.org
… provides opportunities for new authentication methods [38], … People with upper extremity
disabilities have difculty typing [28]… authentication with visual impairments, hearing impairments, …

Assessment of upper extremity impairment, function, and activity after stroke: foundations for clinical decision making

CE Lang, MD Bland, RR Bailey, SY Schaefer… - Journal of Hand …, 2013 - Elsevier
approach for assessing the upper extremity (UE) after stroke. First, common UE impairments
and … Although multiple UE impairments are typically present after stroke, the severity of one's …