CUE: counterfeit-resistant usable eye movement-based authentication via oculomotor plant characteristics and complex eye movement patterns
OV Komogortsev, A Karpov… - … Technologies for Global …, 2012 - spiedigitallibrary.org
The widespread use of computers throughout modern society introduces the necessity for
usable and counterfeit-resistant authentication methods to ensure secure access to personal …
usable and counterfeit-resistant authentication methods to ensure secure access to personal …
Leveraging motor learning for a tangible password system
Tangible user interfaces (TUIs) may allow users to have more direct interaction with systems
when compared to traditional graphical user interfaces (GUIs). However, the full range of …
when compared to traditional graphical user interfaces (GUIs). However, the full range of …
Understanding the Design Space of Embodied Passwords based on Muscle Memory
R Van Koningsbruggen, B Hengeveld… - Proceedings of the 2021 …, 2021 - dl.acm.org
Passwords have become a ubiquitous part of our everyday lives, needed for every web-
service and system. However, it is challenging to create safe and diverse alphanumeric …
service and system. However, it is challenging to create safe and diverse alphanumeric …
Discovering trends for the development of novel authentication applications for dementia patients
We aim at creating ease in authentication process through non-password-based
authentication scheme for the Dementia patients. The chronic neuro-degenerative disease …
authentication scheme for the Dementia patients. The chronic neuro-degenerative disease …
Investigating the usability of software systems for music production and distribution
SA McGrath - 2015 - bura.brunel.ac.uk
The work here aims to evaluate the usability of software applications and define their quality
for stakeholders in the music industry. Initial work focuses on standardised tools and …
for stakeholders in the music industry. Initial work focuses on standardised tools and …
An Exploratory Investigation Into the Use of eAUP as an Alternative to Text-based Passwords
JA Abandoh-Sam - 2012 - digitalcommons.andrews.edu
Security is one of the major concerns of every industry in the world today. One of the best
ways of hacking into a computer system is brute forcing. And with the increase in computing …
ways of hacking into a computer system is brute forcing. And with the increase in computing …