[PDF][PDF] Universal authentication: towards accessible authentication for everyone

Y Wang - ACM Press, 2014 - cups.cs.cmu.edu
Logging into a system or website with user names and passwords (ie, authentication) is an
essential part of people's everyday computer/Internet activities. However, this mundane …

Toward accessible authentication: learning from people with visual impairments

B Dosono, J Hayes, Y Wang - IEEE Internet Computing, 2018 - ieeexplore.ieee.org
Current authentication mechanisms often pose significant challenges for people with
disabilities. Drawing from a contextual inquiry study of visually impaired individuals …

" I Always Have to Think About It First" Authentication Experiences of People with Cognitive Impairments

J Hayes, X Li, Y Wang - Proceedings of the 19th International ACM …, 2017 - dl.acm.org
Authentication is a mundane yet often integral part of people's experiences with computing
devices and Internet services. Since most authentication mechanisms were designed …

A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - Proceedings of the 22nd …, 2020 - dl.acm.org
Reliable and accessible authentication techniques are required to maintain privacy and
security. This is paramount as technology plays an increasing role in our lives. In this paper …

Disadvantaged by disability: examining the accessibility of cyber security

S Furnell, K Helkala, N Woods - International Conference on Human …, 2021 - Springer
Today, we are living in a digitally dependent world. Through the use of digital technologies,
life is meant to be easier and streamlined. This includes giving access to services that …

Cognitive function vs. accessible authentication: insights from dyslexia research

J Ophoff, G Johnson, K Renaud - … of the 18th International Web for All …, 2021 - dl.acm.org
The most common authentication mechanism, the password, requires a user to recall a
secret. Users take this memorisation, or cognitive function, test on a daily basis in order to …

Seamless Authentication for Ubiquitous Devices

S Mare - 2016 - digitalcommons.dartmouth.edu
User authentication is an integral part of our lives; we authenticate ourselves to personal
computers and a variety of other things several times a day. Authentication is burdensome …

Accessible authentication: Assessing the applicability for users with disabilities

S Furnell, K Helkala, N Woods - Computers & security, 2022 - Elsevier
Access to the many benefits available from digital technology can often vary depending
upon the capabilities and facilities of the individual who is attempting to engage with it. Many …

[PDF][PDF] Authentication technologies for the blind or visually impaired

N Saxena, JH Watt - Proceedings of the USENIX Workshop on Hot …, 2009 - usenix.org
Abstract Current research on “Usable Security” is still in its infancy and usable security
solutions are often designed without paying attention to human disabilities. This paper aims …

Strategies: an inclusive authentication framework

NM Barbosa - Proceedings of the 16th international ACM …, 2014 - dl.acm.org
This paper briefly describes a proposed interaction workflow that is currently being
developed as part of a research effort towards providing better solutions for accessible …