S Karatzouni, SM Furnell, NL Clarke… - Proceedings of the …, 2007 - Citeseer
The increasing range of data and services accessible from mobile devices, such as cellphones and PDAs, leads to questions about the adequacy of security provision …
With the embedding of EEG (electro-encephalography) sensors in wireless headsets and other consumer electronics, authenticating users based on their brainwave signals has …
Alphanumeric passwords are still the most common form of user authentication despite well- known usability issues. These issues, including weak composition and poor memorability …
Augmented-reality glasses like Google Glass present a new set of user-interface trade-offs which must be carefully considered in crafting user authentication protocols. First, it lacks a …
This dissertation deals with the field of usable security, particularly in the contexts of online authentication and verifiable voting systems. The ever-expanding role of online accounts in …
W He, J Hainline, R Padhi, B Ur - … of the Interactive Workshop on the …, 2018 - par.nsf.gov
Despite rapid advancements in authentication technologies, little user testing has been conducted on the various authentication methods proposed for smart homes. Users' …
Windows Hello for Business is Microsoft's latest attempt to replace passwords in Windows enterprise environments introduced with Windows 10. It addresses some of the common …
Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the …
We present a structured literature survey of User Experience (UX) dimensions and influencing factors in authentication research. The survey is based on authentication papers …