A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments

B Lewis, P Kirupaharan, TM Ranalli… - ACM Transactions on …, 2024 - dl.acm.org
Current computing device authentication often presents accessibility barriers for people with
upper extremity impairments (UEI). In this article, we present a framework called Accessible …

“I... Got my Nose-Print. But it Wasn't Accurate”: How People with Upper Extremity Impairment Authenticate on their Personal Computing Devices

B Lewis, K Venkatasubramanian - … of the 2021 CHI Conference on …, 2021 - dl.acm.org
Authentication has become increasingly ubiquitous for controlling access to personal
computing devices (eg, laptops, tablets, and smartphones). In this paper, we aim to …

A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US

N Noah, P Mayer, S Das - … Publication of the 2023 Conference on …, 2023 - dl.acm.org
In recent years, augmented and virtual reality (AR/VR) technologies have advanced
significantly, becoming more accessible and practical for various industries and …

Toward accessible authentication: learning from people with visual impairments

B Dosono, J Hayes, Y Wang - IEEE Internet Computing, 2018 - ieeexplore.ieee.org
Current authentication mechanisms often pose significant challenges for people with
disabilities. Drawing from a contextual inquiry study of visually impaired individuals …

A new authentication approach for people with upper extremity impairment

B Lewis, J Hebert… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
In recent years, people with upper extremity impairment (UEI) have been using wearable
Internet of Things (wIoT) devices like head-mounted devices (HMDs) for a variety of …

A review of literature on accessibility and authentication techniques

S Andrew, S Watson, T Oh, GW Tigwell - Proceedings of the 22nd …, 2020 - dl.acm.org
Reliable and accessible authentication techniques are required to maintain privacy and
security. This is paramount as technology plays an increasing role in our lives. In this paper …

Seamless Authentication for Ubiquitous Devices

S Mare - 2016 - digitalcommons.dartmouth.edu
User authentication is an integral part of our lives; we authenticate ourselves to personal
computers and a variety of other things several times a day. Authentication is burdensome …

" I Always Have to Think About It First" Authentication Experiences of People with Cognitive Impairments

J Hayes, X Li, Y Wang - Proceedings of the 19th International ACM …, 2017 - dl.acm.org
Authentication is a mundane yet often integral part of people's experiences with computing
devices and Internet services. Since most authentication mechanisms were designed …

Disadvantaged by disability: examining the accessibility of cyber security

S Furnell, K Helkala, N Woods - International Conference on Human …, 2021 - Springer
Today, we are living in a digitally dependent world. Through the use of digital technologies,
life is meant to be easier and streamlined. This includes giving access to services that …

Wearable authentication: Trends and opportunities

A Bianchi, I Oakley - it-Information Technology, 2016 - degruyter.com
Wearables are a rapidly emerging device category with wide-reaching use scenarios. The
novel form factors and broad potential of this technology pose new security challenges …