Mobile device assisted secure computer network communication

B Zhu, M Feng, X Yin, Y Yang, Y Zhang… - US Patent …, 2012 - Google Patents
Mobile device assisted secure computer network communications embodiments are
presented that employ a mobile device (eg, a mobile phone, personal digital assistant …

Stay home! Conducting remote usability evaluations of novel real-world authentication systems using virtual reality

F Mathis, J O'hagan, K Vaniea, M Khamis - Proceedings of the 2022 …, 2022 - dl.acm.org
Evaluating interactive systems often requires researchers to invite user study participants to
the lab. However, corresponding evaluations often lack realism and participants are usually …

Touch & interact: touch-based interaction of mobile phones with displays

R Hardy, E Rukzio - Proceedings of the 10th international conference on …, 2008 - dl.acm.org
The limited screen size and resolution of current mobile devices can still be problematic for
map, multimedia and browsing applications. In this paper we present Touch & Interact: an …

Vibrapass: secure authentication based on shared lies

A De Luca, E Von Zezschwitz, H Hußmann - Proceedings of the SIGCHI …, 2009 - dl.acm.org
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not
uncommon nowadays. The biggest group of attacks is observation attacks, which focus on …

Universal multi-factor authentication using graphical passwords

AP Sabzevar, A Stavrou - 2008 IEEE international conference …, 2008 - ieeexplore.ieee.org
In this paper, we present a series of methods to authenticate a user with a graphical
password. To that end, we employ the user¿ s personal handheld device as the password …

Interaction techniques for creating and exchanging content with public displays

F Alt, AS Shirazi, T Kubitza, A Schmidt - Proceedings of the SIGCHI …, 2013 - dl.acm.org
Falling hardware prices and ever more displays being connected to the Internet will lead to
large public display networks, potentially forming a novel communication medium. We …

Trustworthy and personalized computing on public kiosks

S Garriss, R Cáceres, S Berger, R Sailer… - Proceedings of the 6th …, 2008 - dl.acm.org
Many people desire ubiquitous access to their personal computing environments. We
present a system in which a user leverages a personal mobile device to establish trust in a …

GTmoPass: two-factor authentication on public displays using gaze-touch passwords and personal mobile devices

M Khamis, R Hasholzner, A Bulling, F Alt - Proceedings of the 6th ACM …, 2017 - dl.acm.org
As public displays continue to deliver increasingly private and personalized content, there is
a need to ensure that only the legitimate users can access private information in sensitive …

Using fake cursors to secure on-screen password entry

A De Luca, E Von Zezschwitz, L Pichler… - Proceedings of the …, 2013 - dl.acm.org
In this paper, we present a concept using fake cursors to disguise on-screen password entry.
We performed two user studies with different amounts of dummy cursors and differently …

The feet in human-centred security: Investigating foot-based user authentication for public displays

K Watson, R Bretin, M Khamis, F Mathis - CHI Conference on Human …, 2022 - dl.acm.org
A large body of work investigated touch, mid-air, and gaze-based user authentication.
However, little is known about authentication using other human body parts. In this paper …