Pairing schemes establish cryptographic keys to secure communication among IoT devices. Existing pairing approaches that rely on trusted central entities, human interaction, or shared …
M Corbett, J Shang, B Ji - IEEE Transactions on Mobile …, 2023 - ieeexplore.ieee.org
As Augmented Reality (AR) devices become more prevalent and commercially viable, the need for quick, efficient, and secure schemes for pairing these devices has become more …
H Cao, D Liu, H Jiang, J Luo - IEEE Transactions on Mobile …, 2022 - ieeexplore.ieee.org
User authentication is a critical module to achieve security and privacy protections, especially for pervasive Internet of Things (IoT) deployments. However, existing methods on …
We explore how discreet input can be provided using the tensor tympani-a small muscle in the middle ear that some people can voluntarily contract to induce a dull rumbling sound …
Temporal synchronous target selection is an association-free selection technique: users select a target by generating signals (eg, finger taps and hand claps) in sync with its unique …
In the past years, human computer interaction (HCI) research and innovation have developed substantially, leading to a number of fruitful research topics. In this paper, we …
S Murali, W Jin, V Sivaraman, H Zhu, T Ji… - Proceedings of the 39th …, 2023 - dl.acm.org
Most terminal devices authenticate users only once at the time of initial login, leaving the terminal unprotected during an active session when the original user leaves it unattended …
Rhythmic-synchronization-based interaction is an emerging interaction technique where multiple controls with different rhythms are displayed in visual form, and the user can select …
H Ye, Q Zeng, J Liu, X Du… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Context-based paring is a promising direction for pairing IoT devices constrained in user interfaces (UIs). However, it takes a proximate distance or a long time for IoT devices to …