Universal usability: Past, present, and future

G Meiselwitz, B Wentz, J Lazar - Foundations and Trends® in …, 2010 - nowpublishers.com
Computers are used all over the world in a variety of contexts by users with all levels of
technical experience. This includes users such as kindergarteners, older users, people with …

A review on smart home technology

S Suresh, PV Sruthi - 2015 online international conference on …, 2015 - ieeexplore.ieee.org
Smart Home domain is a new trendy way of home automation and energy conservation. The
increasing demand on home automation and self care for the elderly and the disabled …

Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation

Z Zhao, GJ Ahn, H Hu - ACM Transactions on Information and System …, 2015 - dl.acm.org
Picture gesture authentication has been recently introduced as an alternative login
experience to text-based password on touch-screen devices. In particular, the newly on …

Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass

DK Yadav, B Ionascu, SV Krishna Ongole… - … Cryptography and Data …, 2015 - Springer
This paper explores options to the built-in authentication mechanism of the Google Glass
which is vulnerable to shoulder surfing attacks. Two simple PIN-based authentication …

Constructing secure and memorable passwords

J Kävrestad, M Lennartsson, M Birath… - Information & Computer …, 2020 - emerald.com
Purpose Using authentication to secure data and accounts has grown to be a natural part of
computing. Even if several authentication methods are in existence, using passwords …

G-RAT| a novel graphical randomized authentication technique for consumer smart devices

MA Khan, IU Din, SU Jadoon, MK Khan… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
User authentication is the process that is exercised millions of times around the globe by
using different techniques and methods. The most prominent way of authentication is …

TIM: Secure and usable authentication for smartphones

GC Yang, Q Hu, MR Asghar - Journal of information security and …, 2022 - Elsevier
With the widespread popularity of smartphones and mobile applications, they have
gradually penetrated and are widely used in our daily lives, eg, we use them for online …

“If it wasn't secure, they would not use it in the movies”–security perceptions and user acceptance of authentication technologies

V Zimmermann, N Gerber - … Aspects of Information Security, Privacy and …, 2017 - Springer
Whereas the text password is still ubiquitous as authentication scheme, its shortcomings are
well-acknowledged within the research community. A plurality of alternatives such as other …

GPOD: an efficient and secure graphical password authentication system by fast object detection

P Ray, D Giri, W Meng, S Hore - Multimedia Tools and Applications, 2023 - Springer
Nowadays, the graphical password has gained significant recognition and has become a
subject of extensive investigation within the research community. The proliferation of Internet …

[HTML][HTML] Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica.

O Rodriguez Valdés, CM Legón… - Revista Cubana de …, 2018 - scielo.sld.cu
La autenticación es un área clave en la seguridad de la información. En la modernidad los
usuarios necesitan acceder a muchos servicios digitales imprescindibles para su vida …