Airauth: evaluating in-air hand gestures for authentication
Secure authentication with devices or services that store sensitive and personal information
is highly important. However, traditional password and pin-based authentication methods …
is highly important. However, traditional password and pin-based authentication methods …
Wave to me: user identification using body lengths and natural gestures
We introduce a body-based identification system that leverages individual differences in
body segment lengths and hand waving gesture patterns. The system identifies users based …
body segment lengths and hand waving gesture patterns. The system identifies users based …
Evaluation of user authentication methods in the gadget-free world
In an ideal gadget-free environment the user is interacting with the environment and the
services through only “natural” means. This imposes restrictions on many aspects of the …
services through only “natural” means. This imposes restrictions on many aspects of the …
[PDF][PDF] Advanced authentication using 3d passwords in virtual world
N Salian, S Godbole, S Wagh - Int. J. Eng. Tech. Res, 2015 - academia.edu
Providing Authentication to any system leads to provide more security to that system. There
are many authentication techniques, such as textual password, graphical password, etc. but …
are many authentication techniques, such as textual password, graphical password, etc. but …
Which one to go: Security and usability evaluation of mid-air gestures
With the emerging of touch-less human-computer interaction techniques and gadgets, mid-
air hand gestures have been widely used for authentication. Much literature examined either …
air hand gestures have been widely used for authentication. Much literature examined either …
Peripheral interaction
D Hausen - 2014 - edoc.ub.uni-muenchen.de
In our everyday life we carry out a multitude of activities in parallel without focusing our
attention explicitly on them. We drink a cup of tea while reading a book, we signal a …
attention explicitly on them. We drink a cup of tea while reading a book, we signal a …
Group identification system
R Cunningham, R Shay - US Patent 11,368,318, 2022 - Google Patents
A method for identifying a group of users from a number of users includes receiving, for each
user of the number of users, response data including motion data characterizing motion of …
user of the number of users, response data including motion data characterizing motion of …
Authenticating Users with 3D Passwords Captured by Motion Sensors
J Tian - 2018 - search.proquest.com
Authentication plays a key role in securing various resources including corporate facilities or
electronic assets. As the most used authentication scheme, knowledge-based authentication …
electronic assets. As the most used authentication scheme, knowledge-based authentication …
[PDF][PDF] 3-D Password Secure Authentication with Biometric Device
B Tran - WINONA COMPUTER SCIENCE UNDERGRADUATE …, 2013 - cs.winona.edu
To be safely authenticated, we present a 3-D virtual environment where the user navigates
and interacts with various objects. The sequence of actions and interactions toward the …
and interacts with various objects. The sequence of actions and interactions toward the …