Surveying the development of biometric user authentication on mobile phones
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …
important task to protect users' private information and data. Since biometric approaches can …
“A Stalker's Paradise” How Intimate Partner Abusers Exploit Technology
This paper describes a qualitative study with 89 participants that details how abusers in
intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor …
intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor …
Leakiness and creepiness in app space: Perceptions of privacy and mobile app use
I Shklovski, SD Mainwaring, HH Skúladóttir… - Proceedings of the …, 2014 - dl.acm.org
Mobile devices are playing an increasingly intimate role in everyday life. However, users
can be surprised when informed of the data collection and distribution activities of apps they …
can be surprised when informed of the data collection and distribution activities of apps they …
Touch me once and i know it's you! implicit authentication based on touch screen patterns
Password patterns, as used on current Android phones, and other shape-based
authentication schemes are highly usable and memorable. In terms of security, they are …
authentication schemes are highly usable and memorable. In terms of security, they are …
Covert message redaction and recovery in a wireless communication device
JK Whitney, JR Delker - US Patent 8,233,887, 2012 - Google Patents
A wireless communication device comprises a user interface, a memory, a wireless
communication interface, and a processing system. The wireless communication interface is …
communication interface, and a processing system. The wireless communication interface is …
{It's} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception
M Harbach, E Von Zezschwitz, A Fichtner… - 10th symposium on …, 2014 - usenix.org
A lot of research is being conducted into improving the usability and security of phone-
unlocking. There is however a severe lack of scientific data on users' current unlocking …
unlocking. There is however a severe lack of scientific data on users' current unlocking …
" Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia
Women in South Asian own fewer personal devices like laptops and phones than women
elsewhere in the world. Further, cultural expectations dictate that they should share mobile …
elsewhere in the world. Further, cultural expectations dictate that they should share mobile …
Privacy concerns for use of voice activated personal assistant in the public space
A Easwara Moorthy, KPL Vu - International Journal of Human …, 2015 - Taylor & Francis
A review of popular technology adoption models identified several factors that are likely to
influence Voice Activated Personal Assistant (VAPA) use in public spaces. To inform design …
influence Voice Activated Personal Assistant (VAPA) use in public spaces. To inform design …
Understanding shoulder surfing in the wild: Stories from users and observers
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …
attacks. However, there is little work about shoulder surfing situations in the real world. We …
Silentsense: silent user identification via touch and movement behavioral biometrics
In this work, we present SilentSense, a framework to authenticate users silently and
transparently by exploiting the user touch behavior biometrics and leveraging the integrated …
transparently by exploiting the user touch behavior biometrics and leveraging the integrated …