This paper introduced pPen, a pressure-sensitive digital pen enabled precise pressure and touch input on vision based interactive tabletops. With the help of pPen inputs and feature matching technology, we implemented a novel method supporting multi-user authenticated interaction in the bimanual pen and touch scenario: login can be per-formed just by stroking one’s signature with pPen on the table; a binding between user and pPen was created at the same time, then each interaction command made by pPen is user differentiating. We also conducted laboratory user studies, which later proved the safety and the high re-sistance to shoulder surfing problem: in the evaluation pro-cedure, any attacker can never log into other user’s work-ing space. ...
Smartphone has become a commodity device that makes life convenient whereas its capability of user i...
Part 2: Late Breaking ResultsInternational audienceWith the introduction and adoption of tabletop te...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...
The introduction of tabletop interfaces has given rise to the need for the development of secure and...
Pen-based computers bring the promise of tapping into people’s expressiveness with pen and paper and...
Multi-touch tablets allow users to interact with computers through intuitive, natural gestures and d...
Combined bimanual pen and touch input on digital tab-letops is an appealing interaction paradigm enj...
Tabletop systems provide a versatile space for collaboration, yet, in many cases, are limited by the...
Abstract—Interactive large screen displays like tabletops or walls can enhance the interaction betwe...
Abstract—Mobile authentication is indispensable for preventing unauthorized access to multi-touch mo...
Given the pervasion of multi-touch tablet, pen-based applications have rapidly moved onto this new p...
Stitching is a new interaction technique that allows users to combine pen-operated mobile devices wi...
Touch interfaces have now become mainstream thanks to modern smartphones and tablets. However, there...
We explore grip and motion sensing to afford new techniques that leverage how users naturally manipu...
Although many augmented tabletop systems have shown the potential and usability of finger-based inte...
Smartphone has become a commodity device that makes life convenient whereas its capability of user i...
Part 2: Late Breaking ResultsInternational audienceWith the introduction and adoption of tabletop te...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...
The introduction of tabletop interfaces has given rise to the need for the development of secure and...
Pen-based computers bring the promise of tapping into people’s expressiveness with pen and paper and...
Multi-touch tablets allow users to interact with computers through intuitive, natural gestures and d...
Combined bimanual pen and touch input on digital tab-letops is an appealing interaction paradigm enj...
Tabletop systems provide a versatile space for collaboration, yet, in many cases, are limited by the...
Abstract—Interactive large screen displays like tabletops or walls can enhance the interaction betwe...
Abstract—Mobile authentication is indispensable for preventing unauthorized access to multi-touch mo...
Given the pervasion of multi-touch tablet, pen-based applications have rapidly moved onto this new p...
Stitching is a new interaction technique that allows users to combine pen-operated mobile devices wi...
Touch interfaces have now become mainstream thanks to modern smartphones and tablets. However, there...
We explore grip and motion sensing to afford new techniques that leverage how users naturally manipu...
Although many augmented tabletop systems have shown the potential and usability of finger-based inte...
Smartphone has become a commodity device that makes life convenient whereas its capability of user i...
Part 2: Late Breaking ResultsInternational audienceWith the introduction and adoption of tabletop te...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...