{“I'm}{Stuck!”}: A Contextual Inquiry of People with Visual Impairments in Authentication

B Dosono, J Hayes, Y Wang - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
Current authentication mechanisms pose significant challenges for people with visual
impairments. This paper presents results from a contextual inquiry study that investigated the …

A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - Proceedings of the 22nd …, 2020 - dl.acm.org
Reliable and accessible authentication techniques are required to maintain privacy and
security. This is paramount as technology plays an increasing role in our lives. In this paper …

[PDF][PDF] Authentication technologies for the blind or visually impaired

N Saxena, JH Watt - Proceedings of the USENIX Workshop on Hot …, 2009 - usenix.org
Abstract Current research on “Usable Security” is still in its infancy and usable security
solutions are often designed without paying attention to human disabilities. This paper aims …

Understanding authentication method use on mobile devices by people with vision impairment

D Briotto Faustino, A Girouard - Proceedings of the 20th International …, 2018 - dl.acm.org
Passwords help people avoid unauthorized access to their personal devices but are not
without challenges, like memorability and shoulder surfing attacks. Little is known about how …

" I'm Literally Just Hoping This Will {Work:'}'Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities

D Napoli, K Baig, S Maqsood, S Chiasson - Seventeenth Symposium on …, 2021 - usenix.org
To successfully manage security and privacy threats, users must be able to perceive the
relevant information. However, a number of accessibility obstacles impede the access of …

A study of authentication in daily life

S Mare, M Baker, J Gummeson - … on usable privacy and security (SOUPS …, 2016 - usenix.org
We report on a wearable digital diary study of 26 participants that explores people's daily
authentication behavior across a wide range of targets (phones, PCs, websites, doors, cars …

Ubiquitous accessibility for people with visual impairments: Are we there yet?

SM Billah, V Ashok, DE Porter… - Proceedings of the 2017 …, 2017 - dl.acm.org
Ubiquitous access is an increasingly common vision of computing, wherein users can
interact with any computing device or service from anywhere, at any time. In the era of …

Usability and security perceptions of implicit authentication: convenient, secure, sometimes annoying

H Khan, U Hengartner, D Vogel - Eleventh Symposium on Usable …, 2015 - usenix.org
Implicit authentication (IA) uses behavioural biometrics to provide continuous authentication
on smartphones. IA has been advocated as more usable when compared to traditional …

Accessible authentication: Assessing the applicability for users with disabilities

S Furnell, K Helkala, N Woods - Computers & security, 2022 - Elsevier
Access to the many benefits available from digital technology can often vary depending
upon the capabilities and facilities of the individual who is attempting to engage with it. Many …

[HTML][HTML] Biometrics: Accessibility challenge or opportunity?

R Blanco-Gonzalo, C Lunerti, R Sanchez-Reillo… - PloS one, 2018 - journals.plos.org
Biometric recognition is currently implemented in several authentication contexts, most
recently in mobile devices where it is expected to complement or even replace traditional …