Airauth: evaluating in-air hand gestures for authentication

MTI Aumi, S Kratz - Proceedings of the 16th international conference on …, 2014 - dl.acm.org
Secure authentication with devices or services that store sensitive and personal information
is highly important. However, traditional password and pin-based authentication methods …

Evaluation of transaction authentication methods for online banking

S Kiljan, H Vranken, M van Eekelen - Future Generation Computer Systems, 2018 - Elsevier
Authentication is a major research topic in the information security field. Much has been
written about assessing entity (user) authentication methods, but there is a lack of literature …

Cognitive authentication schemes safe against spyware

D Weinshall - 2006 IEEE Symposium on Security and Privacy …, 2006 - ieeexplore.ieee.org
Can we secure user authentication against eavesdropping adversaries, relying on human
cognitive functions alone, unassisted by any external computational device? To accomplish …

User authentication schemes using machine learning methods—a review

N Siddiqui, L Pryor, R Dave - Proceedings of International Conference on …, 2021 - Springer
With the recent advancements in technology, more and more people rely on their personal
devices to store their sensitive information. Concurrently, the environment in which these …

Neuroscience meets cryptography: Crypto primitives secure against rubber hose attacks

H Bojinov, D Sanchez, P Reber, D Boneh… - Communications of the …, 2014 - dl.acm.org
Cryptographic systems often rely on the secrecy of cryptographic keys given to users. Many
schemes, however, cannot resist coercion attacks where the user is forcibly asked by an …

Usability and security perceptions of implicit authentication: convenient, secure, sometimes annoying

H Khan, U Hengartner, D Vogel - Eleventh Symposium on Usable …, 2015 - usenix.org
Implicit authentication (IA) uses behavioural biometrics to provide continuous authentication
on smartphones. IA has been advocated as more usable when compared to traditional …

User perceptions of security, convenience and usability for ebanking authentication tokens

CS Weir, G Douglas, M Carruthers, M Jack - computers & security, 2009 - Elsevier
This research compared three different two-factor methods of eBanking authentication.
Three devices employing incremental security layers in the generation of one time …

A usability study of five {two-factor} authentication methods

K Reese, T Smith, J Dutson, J Armknecht… - … Symposium on Usable …, 2019 - usenix.org
Two-factor authentication (2FA) defends against account compromise. An account secured
with 2FA typically requires an individual to authenticate using something they know …

Security considerations for virtual reality systems

K Viswanathan, A Yazdinejad - arXiv preprint arXiv:2201.02563, 2022 - arxiv.org
There is a growing need for authentication methodology in virtual reality applications.
Current systems assume that the immersive experience technology is a collection of …

Ensuring online exam integrity through continuous biometric authentication

I Traoré, Y Nakkabi, S Saad, B Sayed… - … : Emerging threats and …, 2017 - Springer
A key challenge in online education is the difficulty in ensuring the authenticity of remote test
takers during online exams. This chapter discusses how such challenge can be addressed …