A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Continuous user identification in distance learning: a recent technology perspective
The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the
COVID-19 global pandemic has raised several concerns about the credibility of online …
COVID-19 global pandemic has raised several concerns about the credibility of online …
RFace: Anti-spoofing facial authentication using COTS RFID
Current facial authentication (FA) systems are mostly based on the images of human faces,
thus suffering from privacy leakage and spoofing attacks. Mainstream systems utilize facial …
thus suffering from privacy leakage and spoofing attacks. Mainstream systems utilize facial …
Of two minds about {Two-Factor}: Understanding everyday {FIDO}{U2F} usability through device comparison and experience sampling
Security keys are phishing-resistant two-factor authentication (2FA) tokens based upon the
FIDO Universal 2nd Factor (U2F) standard. Prior research on security keys has revealed …
FIDO Universal 2nd Factor (U2F) standard. Prior research on security keys has revealed …
Velody: Nonlinear vibration challenge-response for resilient user authentication
Biometrics have been widely adopted for enhancing user authentication, benefiting usability
by exploiting pervasive and collectible unique characteristics from physiological or …
by exploiting pervasive and collectible unique characteristics from physiological or …
Prototyping usable privacy and security systems: Insights from experts
Iterative design, implementation, and evaluation of prototype systems is a common
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
The framework of security-enhancing friction: How UX can help users behave more securely
A growing body of research in the usable privacy and security community addresses the
question of how to best influence user behavior to reduce risk-taking. We propose to …
question of how to best influence user behavior to reduce risk-taking. We propose to …
The interplay between humans, technology and user authentication: A cognitive processing perspective
This paper investigates the interplay among human cognitive processing differences (field
dependence vs. field independence), alternative interaction device types (desktop vs. touch) …
dependence vs. field independence), alternative interaction device types (desktop vs. touch) …
Performance and usability evaluation of brainwave authentication techniques with consumer devices
P Arias-Cabarcos, M Fallahi, T Habrich… - ACM Transactions on …, 2023 - dl.acm.org
Brainwaves have demonstrated to be unique enough across individuals to be useful as
biometrics. They also provide promising advantages over traditional means of …
biometrics. They also provide promising advantages over traditional means of …
Efficient Privacy‐Preserving Fingerprint‐Based Authentication System Using Fully Homomorphic Encryption
T Kim, Y Oh, H Kim - Security and Communication Networks, 2020 - Wiley Online Library
To help smartphone users protect their phone, fingerprint‐based authentication systems (eg,
Apple's Touch ID) have increasingly become popular in smartphones. In web applications …
Apple's Touch ID) have increasingly become popular in smartphones. In web applications …