Gazetouchpass: Multimodal authentication using gaze and touch on mobile devices

M Khamis, F Alt, M Hassib, E von Zezschwitz… - Proceedings of the …, 2016 - dl.acm.org
We propose a multimodal scheme, GazeTouchPass, that combines gaze and touch for
shoulder-surfing resistant user authentication on mobile devices. GazeTouchPass allows …

Use the force: Evaluating {Force-Sensitive} authentication for mobile devices

K Krombholz, T Hupperich, T Holz - Twelfth symposium on usable …, 2016 - usenix.org
Modern, off-the-shelf smartphones provide a rich set of possible touchscreen interactions,
but knowledge-based authentication schemes still rely on simple digit or character input …

{“I'm}{Stuck!”}: A Contextual Inquiry of People with Visual Impairments in Authentication

B Dosono, J Hayes, Y Wang - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
Current authentication mechanisms pose significant challenges for people with visual
impairments. This paper presents results from a contextual inquiry study that investigated the …

Why Johnny doesn't use two factor a two-phase usability study of the FIDO U2F security key

S Das, A Dingman, LJ Camp - … Nieuwpoort, Curaçao, February 26–March 2 …, 2018 - Springer
Why do individuals choose to use (or not use) Two Factor Authentication (2FA)? We sought
to answer this by implementing a two-phase study of the Yubico Security Key. We analyzed …

Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems

F Mathis, K Vaniea, M Khamis - Proceedings of the 2021 chi conference …, 2021 - dl.acm.org
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …

GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication

M Khamis, M Hassib, E Zezschwitz, A Bulling… - Proceedings of the 19th …, 2017 - dl.acm.org
Although mobile devices provide access to a plethora of sensitive data, most users still only
protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …

Identification and authentication: technology and implementation issues

M Zviran, Z Erlich - … of the Association for Information Systems, 2006 - aisel.aisnet.org
Computer-based information systems in general, and Internet e-commerce and e-business
systems in particular, employ many types of resources that need to be protected against …

Leveraging Biometric Authentication and Blockchain Technology for Enhanced Security in Identity and Access Management Systems

L Gudala, AK Reddy, AKR Sadhu… - Journal of Artificial …, 2022 - thesciencebrigade.com
The ever-expanding realm of digital interactions necessitates the development of robust
Identity and Access Management (IAM) systems. Conventional password-based …

A qualitative study on usability and acceptability of Yubico security key

S Das, G Russo, AC Dingman, J Dev, O Kenny… - Proceedings of the 7th …, 2018 - dl.acm.org
Individual concerns about account takeover and subversion are well-documented. Surveys
indicate that concerns for the privacy and security of online accounts are widely shared …

Continuous authentication using behavioral biometrics

I Deutschmann, P Nordström, L Nilsson - IT professional, 2013 - ieeexplore.ieee.org
A continuous behaviometric authentication system is tested on 99 users over 10 weeks,
focusing on keystroke dynamics, mouse movements, application usage, and the system …