B Lewis, K Venkatasubramanian - … of the 2021 CHI Conference on …, 2021 - dl.acm.org
Authentication has become increasingly ubiquitous for controlling access to personal computing devices (eg, laptops, tablets, and smartphones). In this paper, we aim to …
N Noah, P Mayer, S Das - … Publication of the 2023 Conference on …, 2023 - dl.acm.org
In recent years, augmented and virtual reality (AR/VR) technologies have advanced significantly, becoming more accessible and practical for various industries and …
B Dosono, J Hayes, Y Wang - IEEE Internet Computing, 2018 - ieeexplore.ieee.org
Current authentication mechanisms often pose significant challenges for people with disabilities. Drawing from a contextual inquiry study of visually impaired individuals …
In recent years, people with upper extremity impairment (UEI) have been using wearable Internet of Things (wIoT) devices like head-mounted devices (HMDs) for a variety of …
Reliable and accessible authentication techniques are required to maintain privacy and security. This is paramount as technology plays an increasing role in our lives. In this paper …
User authentication is an integral part of our lives; we authenticate ourselves to personal computers and a variety of other things several times a day. Authentication is burdensome …
J Hayes, X Li, Y Wang - Proceedings of the 19th International ACM …, 2017 - dl.acm.org
Authentication is a mundane yet often integral part of people's experiences with computing devices and Internet services. Since most authentication mechanisms were designed …
Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that …
A Bianchi, I Oakley - it-Information Technology, 2016 - degruyter.com
Wearables are a rapidly emerging device category with wide-reaching use scenarios. The novel form factors and broad potential of this technology pose new security challenges …