The vast majority of existing work on brain biometrics has been conducted on the ongoing electroencephalogram. Here, we argue that the averaged event-related potential (ERP) may …
H Sasamoto, N Christin, E Hayashi - Proceedings of the SIGCHI …, 2008 - dl.acm.org
A number of recent scams and security attacks (phishing, spyware, fake terminals,...) hinge on a crook's ability to observe user behavior. In this paper, we describe the design …
We report on a wearable digital diary study of 26 participants that explores people's daily authentication behavior across a wide range of targets (phones, PCs, websites, doors, cars …
In recent years, behavioral biometrics have become a popular approach to support continuous authentication systems. Most generally, a continuous authentication system can …
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on …
CS Weir, G Douglas, T Richardson… - Interacting with …, 2010 - academic.oup.com
Multi-factor authentication involves the use of more than one mode in authentication processes and is typically employed to increase security compared to a fixed password …
Risk-based Authentication (RBA) is an adaptive security measure to strengthen password- based authentication. RBA monitors additional features during login, and when observed …
S Trewin, C Swart, L Koved, J Martino, K Singh… - Proceedings of the 28th …, 2012 - dl.acm.org
We examine three biometric authentication modalities--voice, face and gesture--as well as password entry, on a mobile device, to explore the relative demands on user time, effort …
K Renaud, A De Angeli - Interacting with computers, 2004 - ieeexplore.ieee.org
Passwords are the almost universal authentication mechanism, even though they are basically flawed and cause problems for users due to poor memorability. Graphical methods …