Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems

F Mathis, K Vaniea, M Khamis - Proceedings of the 2021 chi conference …, 2021 - dl.acm.org
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …

Stay home! Conducting remote usability evaluations of novel real-world authentication systems using virtual reality

F Mathis, J O'hagan, K Vaniea, M Khamis - Proceedings of the 2022 …, 2022 - dl.acm.org
Evaluating interactive systems often requires researchers to invite user study participants to
the lab. However, corresponding evaluations often lack realism and participants are usually …

A literature review on virtual reality authentication

JM Jones, R Duezguen, P Mayer, M Volkamer… - Human Aspects of …, 2021 - Springer
As virtual reality (VR) sees an increase in use in several domains such as retail, education,
military; a secure authentication scheme for VR devices is necessary to keep users' personal …

Rubikauth: Fast and secure authentication in virtual reality

F Mathis, J Williamson, K Vaniea… - Extended Abstracts of the …, 2020 - dl.acm.org
There is a growing need for usable and secure authentication in virtual reality (VR).
Established concepts (eg, 2D graphical PINs) are vulnerable to observation attacks, and …

Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality

C George, M Khamis, E von Zezschwitz, M Burger… - 2017 - eprints.gla.ac.uk
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For
example, in the near future users may be able to visit virtual shopping malls and virtually join …

Investigating the third dimension for authentication in immersive virtual reality and in the real world

C George, M Khamis, D Buschek… - 2019 ieee conference …, 2019 - ieeexplore.ieee.org
Immersive Virtual Reality (IVR) is a growing 3D environment, where social and commercial
applications will require user authentication. Similarly, smart homes in the real world (RW) …

Cuevr: Studying the usability of cue-based authentication for virtual reality

Y Abdelrahman, F Mathis, P Knierim, A Kettler… - Proceedings of the …, 2022 - dl.acm.org
Existing virtual reality (VR) authentication schemes are either slow or prone to observation
attacks. We propose CueVR, a cue-based authentication scheme that is resilient against …

Knowledge-driven biometric authentication in virtual reality

F Mathis, HI Fawaz, M Khamis - Extended Abstracts of the 2020 CHI …, 2020 - dl.acm.org
With the increasing adoption of virtual reality (VR) in public spaces, protecting users from
observation attacks is becoming essential to prevent attackers from accessing context …

Security and Privacy in Virtual Reality--A Literature Survey

A Giaretta - arXiv preprint arXiv:2205.00208, 2022 - arxiv.org
Virtual Reality (VR) is a multibillionaire market that keeps growing, year after year. As VR is
becoming prevalent in households and small businesses, it is critical to address the effects …

Nod to auth: Fluent ar/vr authentication with user head-neck modeling

X Wang, Y Zhang - Extended Abstracts of the 2021 CHI Conference on …, 2021 - dl.acm.org
With AR/VR devices becoming increasingly common around us, their user authentication
has posed a critical challenge. While typing passwords is straightforward with a keyboard, it …