Universal usability: Past, present, and future
Computers are used all over the world in a variety of contexts by users with all levels of
technical experience. This includes users such as kindergarteners, older users, people with …
technical experience. This includes users such as kindergarteners, older users, people with …
A review on smart home technology
S Suresh, PV Sruthi - 2015 online international conference on …, 2015 - ieeexplore.ieee.org
Smart Home domain is a new trendy way of home automation and energy conservation. The
increasing demand on home automation and self care for the elderly and the disabled …
increasing demand on home automation and self care for the elderly and the disabled …
Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation
Picture gesture authentication has been recently introduced as an alternative login
experience to text-based password on touch-screen devices. In particular, the newly on …
experience to text-based password on touch-screen devices. In particular, the newly on …
Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass
DK Yadav, B Ionascu, SV Krishna Ongole… - … Cryptography and Data …, 2015 - Springer
This paper explores options to the built-in authentication mechanism of the Google Glass
which is vulnerable to shoulder surfing attacks. Two simple PIN-based authentication …
which is vulnerable to shoulder surfing attacks. Two simple PIN-based authentication …
Constructing secure and memorable passwords
J Kävrestad, M Lennartsson, M Birath… - Information & Computer …, 2020 - emerald.com
Purpose Using authentication to secure data and accounts has grown to be a natural part of
computing. Even if several authentication methods are in existence, using passwords …
computing. Even if several authentication methods are in existence, using passwords …
G-RAT| a novel graphical randomized authentication technique for consumer smart devices
User authentication is the process that is exercised millions of times around the globe by
using different techniques and methods. The most prominent way of authentication is …
using different techniques and methods. The most prominent way of authentication is …
TIM: Secure and usable authentication for smartphones
With the widespread popularity of smartphones and mobile applications, they have
gradually penetrated and are widely used in our daily lives, eg, we use them for online …
gradually penetrated and are widely used in our daily lives, eg, we use them for online …
“If it wasn't secure, they would not use it in the movies”–security perceptions and user acceptance of authentication technologies
V Zimmermann, N Gerber - … Aspects of Information Security, Privacy and …, 2017 - Springer
Whereas the text password is still ubiquitous as authentication scheme, its shortcomings are
well-acknowledged within the research community. A plurality of alternatives such as other …
well-acknowledged within the research community. A plurality of alternatives such as other …
GPOD: an efficient and secure graphical password authentication system by fast object detection
Nowadays, the graphical password has gained significant recognition and has become a
subject of extensive investigation within the research community. The proliferation of Internet …
subject of extensive investigation within the research community. The proliferation of Internet …
[HTML][HTML] Seguridad y usabilidad de los esquemas y técnicas de autenticación gráfica.
O Rodriguez Valdés, CM Legón… - Revista Cubana de …, 2018 - scielo.sld.cu
La autenticación es un área clave en la seguridad de la información. En la modernidad los
usuarios necesitan acceder a muchos servicios digitales imprescindibles para su vida …
usuarios necesitan acceder a muchos servicios digitales imprescindibles para su vida …