A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

Continuous user identification in distance learning: a recent technology perspective

D Portugal, JN Faria, M Belk, P Martins… - Smart Learning …, 2023 - Springer
The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the
COVID-19 global pandemic has raised several concerns about the credibility of online …

RFace: Anti-spoofing facial authentication using COTS RFID

W Xu, J Liu, S Zhang, Y Zheng, F Lin… - … -IEEE Conference on …, 2021 - ieeexplore.ieee.org
Current facial authentication (FA) systems are mostly based on the images of human faces,
thus suffering from privacy leakage and spoofing attacks. Mainstream systems utilize facial …

Of two minds about {Two-Factor}: Understanding everyday {FIDO}{U2F} usability through device comparison and experience sampling

S Ciolino, S Parkin, P Dunphy - … on Usable Privacy and Security (SOUPS …, 2019 - usenix.org
Security keys are phishing-resistant two-factor authentication (2FA) tokens based upon the
FIDO Universal 2nd Factor (U2F) standard. Prior research on security keys has revealed …

Velody: Nonlinear vibration challenge-response for resilient user authentication

J Li, K Fawaz, Y Kim - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Biometrics have been widely adopted for enhancing user authentication, benefiting usability
by exploiting pervasive and collectible unique characteristics from physiological or …

Prototyping usable privacy and security systems: Insights from experts

F Mathis, K Vaniea, M Khamis - International Journal of Human …, 2022 - Taylor & Francis
Iterative design, implementation, and evaluation of prototype systems is a common
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …

The framework of security-enhancing friction: How UX can help users behave more securely

V Distler, G Lenzini, C Lallemand… - Proceedings of the New …, 2020 - dl.acm.org
A growing body of research in the usable privacy and security community addresses the
question of how to best influence user behavior to reduce risk-taking. We propose to …

The interplay between humans, technology and user authentication: A cognitive processing perspective

M Belk, C Fidas, P Germanakos, G Samaras - Computers in Human …, 2017 - Elsevier
This paper investigates the interplay among human cognitive processing differences (field
dependence vs. field independence), alternative interaction device types (desktop vs. touch) …

Performance and usability evaluation of brainwave authentication techniques with consumer devices

P Arias-Cabarcos, M Fallahi, T Habrich… - ACM Transactions on …, 2023 - dl.acm.org
Brainwaves have demonstrated to be unique enough across individuals to be useful as
biometrics. They also provide promising advantages over traditional means of …

Efficient Privacy‐Preserving Fingerprint‐Based Authentication System Using Fully Homomorphic Encryption

T Kim, Y Oh, H Kim - Security and Communication Networks, 2020 - Wiley Online Library
To help smartphone users protect their phone, fingerprint‐based authentication systems (eg,
Apple's Touch ID) have increasingly become popular in smartphones. In web applications …