Airauth: evaluating in-air hand gestures for authentication

MTI Aumi, S Kratz - Proceedings of the 16th international conference on …, 2014 - dl.acm.org
Secure authentication with devices or services that store sensitive and personal information
is highly important. However, traditional password and pin-based authentication methods …

Wave to me: user identification using body lengths and natural gestures

E Hayashi, M Maas, JI Hong - Proceedings of the SIGCHI Conference on …, 2014 - dl.acm.org
We introduce a body-based identification system that leverages individual differences in
body segment lengths and hand waving gesture patterns. The system identifies users based …

Evaluation of user authentication methods in the gadget-free world

K Halunen, J Häikiö, V Vallivaara - Pervasive and Mobile Computing, 2017 - Elsevier
In an ideal gadget-free environment the user is interacting with the environment and the
services through only “natural” means. This imposes restrictions on many aspects of the …

[PDF][PDF] Advanced authentication using 3d passwords in virtual world

N Salian, S Godbole, S Wagh - Int. J. Eng. Tech. Res, 2015 - academia.edu
Providing Authentication to any system leads to provide more security to that system. There
are many authentication techniques, such as textual password, graphical password, etc. but …

Which one to go: Security and usability evaluation of mid-air gestures

W Xu, X Li, J Tian, Y Xiao, X Qu, S Wang… - arXiv preprint arXiv …, 2018 - arxiv.org
With the emerging of touch-less human-computer interaction techniques and gadgets, mid-
air hand gestures have been widely used for authentication. Much literature examined either …

Peripheral interaction

D Hausen - 2014 - edoc.ub.uni-muenchen.de
In our everyday life we carry out a multitude of activities in parallel without focusing our
attention explicitly on them. We drink a cup of tea while reading a book, we signal a …

Group identification system

R Cunningham, R Shay - US Patent 11,368,318, 2022 - Google Patents
A method for identifying a group of users from a number of users includes receiving, for each
user of the number of users, response data including motion data characterizing motion of …

Authenticating Users with 3D Passwords Captured by Motion Sensors

J Tian - 2018 - search.proquest.com
Authentication plays a key role in securing various resources including corporate facilities or
electronic assets. As the most used authentication scheme, knowledge-based authentication …

[PDF][PDF] 3-D Password Secure Authentication with Biometric Device

B Tran - WINONA COMPUTER SCIENCE UNDERGRADUATE …, 2013 - cs.winona.edu
To be safely authenticated, we present a 3-D virtual environment where the user navigates
and interacts with various objects. The sequence of actions and interactions toward the …

[引用][C] Peripheral interaction: exploring the design space

D Hausen - 2014 - München, Ludwig-Maximilians …