[HTML][HTML] Privacy-centered authentication: A new framework and analysis

A Robles-González, P Arias-Cabarcos… - Computers & …, 2023 - Elsevier
The usage of authentication schemes is increasing in our daily life with the ubiquitous
spreading Internet services. The verification of user's identity is still predominantly password …

[PDF][PDF] Perceptions of user authentication on mobile devices

S Karatzouni, SM Furnell, NL Clarke… - Proceedings of the …, 2007 - Citeseer
The increasing range of data and services accessible from mobile devices, such as
cellphones and PDAs, leads to questions about the adequacy of security provision …

I think, therefore I am: Usability and security of authentication using brainwaves

J Chuang, H Nguyen, C Wang, B Johnson - Financial Cryptography and …, 2013 - Springer
With the embedding of EEG (electro-encephalography) sensors in wireless headsets and
other consumer electronics, authenticating users based on their brainwave signals has …

Exploring the acceptability of graphical passwords for people with dyslexia

P Evtimova, J Nicholson - … Interaction–INTERACT 2021: 18th IFIP TC 13 …, 2021 - Springer
Alphanumeric passwords are still the most common form of user authentication despite well-
known usability issues. These issues, including weak composition and poor memorability …

[PDF][PDF] Typing passwords with voice recognition: How to authenticate to Google Glass

DV Bailey, M Dürmuth, C Paar - Proc. of the Symposium on …, 2014 - cups.cs.cmu.edu
Augmented-reality glasses like Google Glass present a new set of user-interface trade-offs
which must be carefully considered in crafting user authentication protocols. First, it lacks a …

Usability: low tech, high security

E Blanchard - 2019 - theses.hal.science
This dissertation deals with the field of usable security, particularly in the contexts of online
authentication and verifiable voting systems. The ever-expanding role of online accounts in …

Clap on, clap off: usability of authentication methods in the smart home

W He, J Hainline, R Padhi, B Ur - … of the Interactive Workshop on the …, 2018 - par.nsf.gov
Despite rapid advancements in authentication technologies, little user testing has been
conducted on the various authentication methods proposed for smart homes. Users' …

Exploring user authentication with windows hello in a small business environment

FM Farke, L Lassak, J Pinter, M Dürmuth - Eighteenth Symposium on …, 2022 - usenix.org
Windows Hello for Business is Microsoft's latest attempt to replace passwords in Windows
enterprise environments introduced with Windows 10. It addresses some of the common …

[图书][B] Who goes there?: Authentication through the lens of privacy

LI Millett, ST Kent - 2003 - books.google.com
Who Goes There?: Authentication Through the Lens of Privacy explores authentication
technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the …

[PDF][PDF] User experience in authentication research: A Survey

L Kraus, JN Antons, F Kaiser, S Möller - Proceedings of the PQS, 2016 - isca-archive.org
We present a structured literature survey of User Experience (UX) dimensions and
influencing factors in authentication research. The survey is based on authentication papers …