Cross-device taxonomy: Survey, opportunities and challenges of interactions spanning across multiple devices

F Brudy, C Holz, R Rädle, CJ Wu, S Houben… - Proceedings of the …, 2019 - dl.acm.org
Designing interfaces or applications that move beyond the bounds of a single device screen
enables new ways to engage with digital content. Research addressing the opportunities …

A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

Finding common ground: A survey of capacitive sensing in human-computer interaction

T Grosse-Puppendahl, C Holz, G Cohn… - Proceedings of the …, 2017 - dl.acm.org
For more than two decades, capacitive sensing has played a prominent role in human-
computer interaction research. Capacitive sensing has become ubiquitous on mobile …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …

Stay cool! understanding thermal attacks on mobile-based user authentication

Y Abdelrahman, M Khamis, S Schneegass… - Proceedings of the 2017 …, 2017 - dl.acm.org
PINs and patterns remain among the most widely used knowledge-based authentication
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …

Understanding Multi-Device Usage Patterns: Physical Device Configurations and Fragmented Workflows

Y Yuan, N Riche, N Marquardt, MJ Nicholas… - Proceedings of the …, 2022 - dl.acm.org
To better ground technical (systems) investigation and interaction design of cross-device
experiences, we contribute an in-depth survey of existing multi-device practices, including …

CoughMatch–subject verification using cough for personal passive health monitoring

K Vatanparvar, E Nemati, V Nathan… - 2020 42nd Annual …, 2020 - ieeexplore.ieee.org
Automatic cough detection using audio has advanced passive health monitoring on devices
such as smart phones and wearables; it enables capturing longitudinal health data by …

“If it wasn't secure, they would not use it in the movies”–security perceptions and user acceptance of authentication technologies

V Zimmermann, N Gerber - … Aspects of Information Security, Privacy and …, 2017 - Springer
Whereas the text password is still ubiquitous as authentication scheme, its shortcomings are
well-acknowledged within the research community. A plurality of alternatives such as other …

BodyWire-HCI Enabling New Interaction Modalities by Communicating Strictly During Touch Using Electro-Quasistatic Human Body Communication

S Maity, D Yang, SS Redford, D Das… - ACM Transactions on …, 2020 - dl.acm.org
Communication during touch provides a seamless and natural way of interaction between
humans and ambient intelligence. Current techniques that couple wireless transmission with …

Auth 'n'scan: Opportunistic photoplethysmography in mobile fingerprint authentication

T Hashizume, T Arizono, K Yatani - … of the ACM on Interactive, Mobile …, 2018 - dl.acm.org
Recent commodity smartphones have biometric sensing capabilities, allowing their daily use
for authentication and identification. This increasing use of biometric systems motivates us to …