A new authentication approach for people with upper extremity impairment

B Lewis, J Hebert… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
In recent years, people with upper extremity impairment (UEI) have been using wearable
Internet of Things (wIoT) devices like head-mounted devices (HMDs) for a variety of …

“I... Got my Nose-Print. But it Wasn't Accurate”: How People with Upper Extremity Impairment Authenticate on their Personal Computing Devices

B Lewis, K Venkatasubramanian - … of the 2021 CHI Conference on …, 2021 - dl.acm.org
Authentication has become increasingly ubiquitous for controlling access to personal
computing devices (eg, laptops, tablets, and smartphones). In this paper, we aim to …

Bag of on-phone ANNs to secure IoT objects using wearable and smartphone biometrics

S Vhaduri, W Cheung, SV Dibbo - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The introduction of the Internet of Things (IoT) has made several emerging applications, from
financial transactions to property access, possible through IoT-connected smart wearables …

Mandipass: Secure and usable user authentication via earphone imu

J Liu, W Song, L Shen, J Han, X Xu… - 2021 IEEE 41st …, 2021 - ieeexplore.ieee.org
Biometric plays an important role in user authentication. However, the most widely used
biometrics, such as facial feature and fingerprint, are easy to capture or record, and thus …

Continuous authentication of wearable device users from heart rate, gait, and breathing data

W Cheung, S Vhaduri - 2020 8th IEEE RAS/EMBS International …, 2020 - ieeexplore.ieee.org
The security of private information is becoming the bedrock of an increasingly digitized
society. While the users are flooded with passwords and PINs, these goldstandard explicit …

Context-dependent implicit authentication for wearable device users

W Cheung, S Vhaduri - … on Personal, Indoor and Mobile Radio …, 2020 - ieeexplore.ieee.org
As market wearables are becoming popular with a range of services, including making
financial transactions, accessing cars, etc. that they provide based on various private …

“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods

A Erinola, A Buckmann, J Friedauer… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
According to the World Health organization, about 16% of the world's population live with a
disability. While they could benefit from digital products and services, users with disabilities …

On-phone CNN model-based implicit authentication to secure IoT wearables

SV Dibbo, W Cheung, S Vhaduri - … Conference on Safety and Security with …, 2022 - Springer
The connectivity of smart technologies, such as smartphones and smart wearables, is ever-
increasing with the emergence of the internet of things (IoT). This technological …

Towards motion invariant authentication for on-body iot devices

Y Huang, M Xu, W Wang, H Wang… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
As the rapid proliferation of on-body Internet of Things (IoT) devices, their security
vulnerabilities have raised serious privacy and safety issues. Traditional efforts to secure …

Thumbup: Identification and authentication by smartwatch using simple hand gestures

X Yu, Z Zhou, M Xu, X You, XY Li - 2020 IEEE international …, 2020 - computer.org
The widespread creative application and smart devices call for convenient and secure
interaction with human users. We propose, design, and implement a smartwatch-based two …