Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective

Y Liang, S Samtani, B Guo, Z Yu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of
connected devices and the customization of passive services. However, conventional …

Understanding shoulder surfing in the wild: Stories from users and observers

M Eiband, M Khamis, E Von Zezschwitz… - Proceedings of the …, 2017 - dl.acm.org
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …

Remote VR studies: A framework for running virtual reality studies remotely via participant-owned HMDs

R Radiah, V Mäkelä, S Prange, SD Rodriguez… - ACM Transactions on …, 2021 - dl.acm.org
We investigate opportunities and challenges of running virtual reality (VR) studies remotely.
Today, many consumers own head-mounted displays (HMDs), allowing them to participate …

Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality

C George, M Khamis, E von Zezschwitz, M Burger… - 2017 - eprints.gla.ac.uk
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For
example, in the near future users may be able to visit virtual shopping malls and virtually join …

Stay cool! understanding thermal attacks on mobile-based user authentication

Y Abdelrahman, M Khamis, S Schneegass… - Proceedings of the 2017 …, 2017 - dl.acm.org
PINs and patterns remain among the most widely used knowledge-based authentication
schemes. As thermal cameras become ubiquitous and affordable, we foresee a new form of …

Gazetouchpass: Multimodal authentication using gaze and touch on mobile devices

M Khamis, F Alt, M Hassib, E von Zezschwitz… - Proceedings of the …, 2016 - dl.acm.org
We propose a multimodal scheme, GazeTouchPass, that combines gaze and touch for
shoulder-surfing resistant user authentication on mobile devices. GazeTouchPass allows …

Continuous authentication with touch behavioral biometrics and voice on wearable glasses

G Peng, G Zhou, DT Nguyen, X Qi… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Wearable glasses are on the rising edge of development with great user popularity.
However, user data stored on these devices bring privacy risks to the owner. To better …

GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication

M Khamis, M Hassib, E Zezschwitz, A Bulling… - Proceedings of the 19th …, 2017 - dl.acm.org
Although mobile devices provide access to a plethora of sensitive data, most users still only
protect them with PINs or patterns, which are vulnerable to side-channel attacks (eg …

SkullConduct: Biometric user identification on eyewear computers using bone conduction through the skull

S Schneegass, Y Oualil, A Bulling - … of the 2016 CHI Conference on …, 2016 - dl.acm.org
Secure user identification is important for the increasing number of eyewear computers but
limited input capabilities pose significant usability challenges for established knowledge …