The TIPPI point: Toward trustworthy interfaces

S Sinclair, SW Smith - IEEE security & privacy, 2005 - ieeexplore.ieee.org
The TIPPI workshop brought security and user interface professionals together to explore
ways to improve authentication methods so that users will not be tricked into giving away …

Understanding user perspective in a university setting to improve biometric authentication adoption

A Patrick, A Burris, S Das, N Noah - Proceedings of the 9th Mexican …, 2022 - dl.acm.org
Personal devices have become equipped with more sophisticated security methods through
biometric authentication, which does not require users to memorize passwords and is …

Authentication melee: A usability analysis of seven web authentication systems

S Ruoti, B Roberts, K Seamons - … of the 24th international conference on …, 2015 - dl.acm.org
Passwords continue to dominate the authentication landscape in spite of numerous
proposals to replace them. Even though usability is a key factor in replacing passwords, very …

Biometric authentication on a mobile device: a study of user effort, error and task disruption

S Trewin, C Swart, L Koved, J Martino, K Singh… - Proceedings of the 28th …, 2012 - dl.acm.org
We examine three biometric authentication modalities--voice, face and gesture--as well as
password entry, on a mobile device, to explore the relative demands on user time, effort …

Choice-based authentication: a usable-security approach

YM Hausawi, WH Allen, GS Bahr - … Conference, UAHCI 2014, Held as Part …, 2014 - Springer
Authentication is an important security component of almost any software application. It
serves as the application's security front door by controlling access with the goal of …

Usability and security perceptions of implicit authentication: convenient, secure, sometimes annoying

H Khan, U Hengartner, D Vogel - Eleventh Symposium on Usable …, 2015 - usenix.org
Implicit authentication (IA) uses behavioural biometrics to provide continuous authentication
on smartphones. IA has been advocated as more usable when compared to traditional …

Identification and authentication: technology and implementation issues

M Zviran, Z Erlich - … of the Association for Information Systems, 2006 - aisel.aisnet.org
Computer-based information systems in general, and Internet e-commerce and e-business
systems in particular, employ many types of resources that need to be protected against …

[PDF][PDF] Designing authentication systems with challenge questions

M Just - Security and usability: Designing secure systems that …, 2005 - researchgate.net
HAT IS YOUR MOTHER'S MAIDEN NAME?”“What is your date of birth?” Such questions are
often used to authenticate an individual. The answers often represent information well …

[PDF][PDF] Adventures in authentication–position paper

H Crawford - Symposium on Usable Privacy and Security …, 2014 - cups.cs.cmu.edu
Authentication on mobile devices is not (and should not be) the same as on desktop and
laptop computers. The differences span not only the device itself and how we interact with it …

Design and evaluation of a simplified online banking interface for people with cognitive disabilities

M Erazo, G Zimmermann - Proceedings of the 17th international ACM …, 2015 - dl.acm.org
This paper is intended to inform readers about the development and evaluation of a
simplified online banking interface for people with cognitive disabilities; this includes a …