[PDF][PDF] Observation study on usability challenges for fingerprint authentication using WebAuthn-enabled android smartphones

W Oogami, H Gomi, S Yamaguchi, S Yamanaka… - Age, 2020 - usenix.org
Abstract Web Authentication (WebAuthn) is an authentication standard developed by the
World Wide Web Consortium (W3C) that enables passwordless login to a website using a …

UbiKiMa: Ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography

M Everts, JH Hoepman, J Siljee - … of the 2013 ACM workshop on Digital …, 2013 - dl.acm.org
Passwords are the only ubiquitous form of authentication currently available on the web.
Unfortunately, passwords are insecure. In this paper we therefore propose the use of strong …

Looks like eve: Exposing insider threats using eye movement biometrics

S Eberz, KB Rasmussen, V Lenders… - ACM Transactions on …, 2016 - dl.acm.org
We introduce a novel biometric based on distinctive eye movement patterns. The biometric
consists of 20 features that allow us to reliably distinguish users based on differences in …

TRUSTED EXECUTION ENVIRONMENT FOR PRIVACY PRESERVING BIOMETRIC AUTHENTICATION.

A Bhargav-Spantzel - Intel Technology Journal, 2014 - search.ebscohost.com
This article describes how a platform's trusted execution environment (TEE) can be
leveraged effectively to provide trustworthy client-and server-side biometric verification. To …

Secure, usable biometric authentication systems

LM Mayron, Y Hausawi, GS Bahr - … Conference, UAHCI 2013, Held as Part …, 2013 - Springer
Biometrics are physiological features that allow individuals to be identified. Popular
biometrics include fingerprints, faces, and irises. A common use of biometric systems is to …

Securing Business's Front Door: Password, Token, and Biometric Authentication

L O'Gorman - Guarding Your Business: A Management Approach to …, 2004 - Springer
Human authentication is the security task whose job is to limit access to computer networks
and physical locations only to those with authorization. This is done by equipping authorized …

Comments on “passbio: Privacy-preserving user-centric biometric authentication”

HY Kwon, MK Lee - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
In 2018, in the above article, Zhou and Ren proposed PassBio, a privacy-preserving
biometric authentication scheme. PassBio delivers its promise and effectively protects users' …

WebTicket: Account management using printable tokens

E Hayashi, B Pendleton, F Ozenc, J Hong - Proceedings of the SIGCHI …, 2012 - dl.acm.org
Passwords are the most common authentication scheme today. However, it is difficult for
people to memorize strong passwords, such as random sequences of characters …

A study of authentication in daily life

S Mare, M Baker, J Gummeson - … on usable privacy and security (SOUPS …, 2016 - usenix.org
We report on a wearable digital diary study of 26 participants that explores people's daily
authentication behavior across a wide range of targets (phones, PCs, websites, doors, cars …

[PDF][PDF] Keystroke dynamics: Low impact biometric verification

T Olzak - Information Security, 2006 - adventuresinsecurity.com
Biometrics has long been one of the solutions touted by security vendors to meet multifactor
authentication objectives. However, user acceptance and cost issues often prevent …