[PDF][PDF] Authentication technologies for the blind or visually impaired

N Saxena, JH Watt - Proceedings of the USENIX Workshop on Hot …, 2009 - usenix.org
Abstract Current research on “Usable Security” is still in its infancy and usable security
solutions are often designed without paying attention to human disabilities. This paper aims …

A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - Proceedings of the 22nd …, 2020 - dl.acm.org
Reliable and accessible authentication techniques are required to maintain privacy and
security. This is paramount as technology plays an increasing role in our lives. In this paper …

“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods

A Erinola, A Buckmann, J Friedauer… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
According to the World Health organization, about 16% of the world's population live with a
disability. While they could benefit from digital products and services, users with disabilities …

Perceptions of mobile device authentication mechanisms by individuals who are blind

F Wolf, R Kuber, AJ Aviv - Proceedings of the 19th International ACM …, 2017 - dl.acm.org
This paper describes an exploratory study focusing on the methods of mobile authentication
currently utilized by individuals who are blind. Perceptions of security are discussed, along …

Disadvantaged by disability: examining the accessibility of cyber security

S Furnell, K Helkala, N Woods - International Conference on Human …, 2021 - Springer
Today, we are living in a digitally dependent world. Through the use of digital technologies,
life is meant to be easier and streamlined. This includes giving access to services that …

Toward accessible authentication: learning from people with visual impairments

B Dosono, J Hayes, Y Wang - IEEE Internet Computing, 2018 - ieeexplore.ieee.org
Current authentication mechanisms often pose significant challenges for people with
disabilities. Drawing from a contextual inquiry study of visually impaired individuals …

" I Always Have to Think About It First" Authentication Experiences of People with Cognitive Impairments

J Hayes, X Li, Y Wang - Proceedings of the 19th International ACM …, 2017 - dl.acm.org
Authentication is a mundane yet often integral part of people's experiences with computing
devices and Internet services. Since most authentication mechanisms were designed …

Hands-Free one-Time and continuous authentication using glass wearable devices

D Damopoulos, G Kambourakis - Journal of Information Security and …, 2019 - Elsevier
This paper investigates whether glass wearable devices can be used to authenticate end-
users, both to grant access (one-time) and to maintain access (continuous), in a hands-free …

Accessible authentication: Assessing the applicability for users with disabilities

S Furnell, K Helkala, N Woods - Computers & security, 2022 - Elsevier
Access to the many benefits available from digital technology can often vary depending
upon the capabilities and facilities of the individual who is attempting to engage with it. Many …

PassChords: secure multi-touch authentication for blind people

S Azenkot, K Rector, R Ladner… - Proceedings of the 14th …, 2012 - dl.acm.org
Blind mobile device users face security risks such as inaccessible authentication methods,
and aural and visual eavesdropping. We interviewed 13 blind smartphone users and found …