Who Are You? It Depends (On What You Ask {Me!)}:{Context-Dependent} Dynamic User Authentication

RV Sampangi, K Hawkey - Twelfth Symposium on Usable Privacy and …, 2016 - usenix.org
In this position paper, we present a new mechanism for contextdependent user
authentication. We propose an approach in which the type of authentication (single/two …

SoK: evaluating privacy and security concerns of using web services for the disabled population

A Zezulak, F Tazi, S Das - arXiv preprint arXiv:2302.13261, 2023 - arxiv.org
The online privacy and security of the disabled community is a complex field that has
implications for every user who navigates web services. While many disciplines have …

Sequential gestural passcodes on google glass

A Ali - Proceedings of the 17th International ACM …, 2015 - dl.acm.org
This paper details an authentication mechanism aimed to aid individuals with visual
impairments in accessing online accounts on desktop computers, and decrease the security …

A personalized user authentication approach based on individual differences in information processing

M Belk, C Fidas, P Germanakos… - Interacting with …, 2015 - ieeexplore.ieee.org
An effective user authentication mechanism should embrace both security and usability
aspects as its purpose is to ensure safety of operation of online services but as well usability …

The relationship between usability and biometric authentication in mobile phones

CG Allen, S Komandur - HCI International 2019-Posters: 21st International …, 2019 - Springer
It is estimated that over 1 billion people are active mobile phone users in 2018. When using
a mobile phone, there are a variety of ways to authenticate and “secure” the device, and …

[PDF][PDF] A world with many authentication schemes

A Forget - 2013 - repository.library.carleton.ca
Usability and security challenges with standard text passwords have led researchers and
professionals to consider alternative authentication schemes. This thesis explores the …

From passwords to biometrics: In pursuit of a panacea

SM Furnell - Information Systems Security and Privacy: First …, 2015 - Springer
User authentication is a fundamental aspect of security, and a standard requirement on
many of the devices and services that people use on a daily basis. However, while a variety …

Designing with and for People with Intellectual Disabilities

L Soares Guedes, RC Gibson, K Ellis, L Sitbon… - Proceedings of the 24th …, 2022 - dl.acm.org
People with intellectual disabilities often experience inequalities that affect the standard of
their everyday lives. Assistive technologies can help alleviate some of these inequalities, yet …

Digital authentication and dyslexia: A survey of the problems and needs of dyslexia people

N Kelly, H Petrie - … Conference on Computers Helping People with …, 2022 - Springer
It might be expected that people with dyslexia would have difficulties with password creation
and maintenance, given their difficulties with language, often with spelling and correctly …

Explore-a-nation: Combining graphical and alphanumeric authentication

LN Tiller, CA Angelini, SC Leibner, JD Still - … , HCI-CPT 2019, Held as Part …, 2019 - Springer
Graphical authentication has been a proposed solution to the usability and memorability
issues seen with traditional alphanumeric passwords. However, graphical authentication …