Reliable and accessible authentication techniques are required to maintain privacy and security. This is paramount as technology plays an increasing role in our lives. In this paper …
N Saxena, JH Watt - Proceedings of the USENIX Workshop on Hot …, 2009 - usenix.org
Abstract Current research on “Usable Security” is still in its infancy and usable security solutions are often designed without paying attention to human disabilities. This paper aims …
Passwords help people avoid unauthorized access to their personal devices but are not without challenges, like memorability and shoulder surfing attacks. Little is known about how …
To successfully manage security and privacy threats, users must be able to perceive the relevant information. However, a number of accessibility obstacles impede the access of …
We report on a wearable digital diary study of 26 participants that explores people's daily authentication behavior across a wide range of targets (phones, PCs, websites, doors, cars …
Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of …
Implicit authentication (IA) uses behavioural biometrics to provide continuous authentication on smartphones. IA has been advocated as more usable when compared to traditional …
Access to the many benefits available from digital technology can often vary depending upon the capabilities and facilities of the individual who is attempting to engage with it. Many …
Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional …