B Dosono, J Hayes, Y Wang - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
Current authentication mechanisms pose significant challenges for people with visual impairments. This paper presents results from a contextual inquiry study that investigated the …
B Dosono, J Hayes, Y Wang - IEEE Internet Computing, 2018 - ieeexplore.ieee.org
Current authentication mechanisms often pose significant challenges for people with disabilities. Drawing from a contextual inquiry study of visually impaired individuals …
Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that …
Logging into a system or website with user names and passwords (ie, authentication) is an essential part of people's everyday computer/Internet activities. However, this mundane …
A Erinola, A Buckmann, J Friedauer… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
According to the World Health organization, about 16% of the world's population live with a disability. While they could benefit from digital products and services, users with disabilities …
Reliable and accessible authentication techniques are required to maintain privacy and security. This is paramount as technology plays an increasing role in our lives. In this paper …
The most common authentication mechanism, the password, requires a user to recall a secret. Users take this memorisation, or cognitive function, test on a daily basis in order to …
Y Ma, J Feng, L Kumin, J Lazar - ACM Transactions on Accessible …, 2013 - dl.acm.org
A wide variety of authentication mechanisms have been designed to ensure information security. Individuals with cognitive disabilities depend on computers and the Internet for a …
Access to the many benefits available from digital technology can often vary depending upon the capabilities and facilities of the individual who is attempting to engage with it. Many …