C-Auth: Exploring the Feasibility of Using Egocentric View of Face Contour for User Authentication on Glasses

H Lim, G Hu, R Jin, H Chen, R Mao, R Zhang… - Proceedings of the …, 2023 - dl.acm.org
C-Auth is a novel authentication method for smart glasses that explores the feasibility of
authenticating users using the facial contour lines from the nose and cheeks captured by a …

Airauth: evaluating in-air hand gestures for authentication

MTI Aumi, S Kratz - Proceedings of the 16th international conference on …, 2014 - dl.acm.org
Secure authentication with devices or services that store sensitive and personal information
is highly important. However, traditional password and pin-based authentication methods …

Design of a Tactile Aid for Non-Observable Mobile Authentication to Address Observation Attacks

F Wolf, R Kuber, AJ Aviv - 2017 - mdsoar.org
Shoulder surfing remains a liability to the security of private data on mobile phones, even as
secondary biometric authentication becomes more commonplace. Mobile users in public or …

[PDF][PDF] Vision: Towards Fully Shoulder-Surfing Resistant and Usable Authentication for Virtual Reality

T Länge, P Matheis, R Düzgün… - … on Usable Security …, 2024 - ndss-symposium.org
Virtual reality (VR) is a growing technology with social, gaming and commercial applications.
Due to the sensitive data involved, these systems require secure authentication. Shoulder …

Hands-Free one-Time and continuous authentication using glass wearable devices

D Damopoulos, G Kambourakis - Journal of Information Security and …, 2019 - Elsevier
This paper investigates whether glass wearable devices can be used to authenticate end-
users, both to grant access (one-time) and to maintain access (continuous), in a hands-free …

{“I'm}{Stuck!”}: A Contextual Inquiry of People with Visual Impairments in Authentication

B Dosono, J Hayes, Y Wang - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
Current authentication mechanisms pose significant challenges for people with visual
impairments. This paper presents results from a contextual inquiry study that investigated the …

A usable and robust continuous authentication framework using wearables

A Acar, H Aksu, AS Uluagac… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
One-time login process in conventional authentication systems does not guarantee that the
identified user is the actual user throughout the session. However, it is necessary to re-verify …

AugAuth: Shoulder-surfing resistant authentication for augmented reality

R Zhang, N Zhang, C Du, W Lou… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
As computing system continues to play an increasing role in daily life, user authentication is
now an important component. One of the most widely accepted methods for user …

[PDF][PDF] OpenUAT: The open source ubiquitous authentication toolkit

R Mayrhofer, I Ion - Technical Report/ETH Zurich …, 2010 - research-collection.ethz.ch
Authenticating spontaneous interactions between devices and users is challenging for
several reasons: the wireless (and therefore invisible) nature of device communication, the …

Killing the password and preserving privacy with device-centric and attribute-based authentication

K Papadamou, S Zannettou, B Chifor… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Current authentication methods on the Web have serious weaknesses. First, services
heavily rely on the traditional password paradigm, which diminishes the end-users' security …