ENGELSK: This thesis investigates the use of hand gestures as an additional modality in authentication schemes, to thwart the risk of observation (shoulder surfing) attacks. We used the accelerometer already embedded in the iPod Touch to gather accelerometer signals, which were used to conduct experiments on how accurately we could recognize and differentiate different gestures. We restricted ourselves to a pre-defined set of gestures, and achieved an EER of 5% on the controlled wrist movements, and 8% after including two circular motions. The algorithms we used were tailored to fit the limited computational power of the iPod Touch, as we needed a recognition module that could be used in real time for our authentication schemes. Aft...
Biometrics are a convenient alternative to traditional forms of access control such as passwords and...
International audienceNowadays, authentication is required for both physical access to buildings and...
International audienceNowadays, authentication is required for both physical access to buildings and...
ENGELSK: This thesis investigates the use of hand gestures as an additional modality in authenticati...
This project describes an authentication technique that is shoulder-surfing resistant. Shoulder sur...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
Mobile devices offer their users lots of possibilities and a feeling of freedom. However, this free-...
Eye-gaze and mid-air gestures are promising for resisting various types of side-channel attacks duri...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
Gestures are a topic of increasing interest in authentication and successful implementation as a sec...
Secure authentication on situated displays (e.g., to access sensitive information or to make purchas...
Abstract. We study the feasibility of leveraging the sensors embedded on mo-bile devices to enable a...
This paper studies the security and memorability of free-form multitouch gestures for mobile authent...
In this paper, we consider the problem of authentication on a smartphone, based on gestures. Specifi...
The rapid growth of accelerometer use on consumer electronics has brought an opportunity for unique ...
Biometrics are a convenient alternative to traditional forms of access control such as passwords and...
International audienceNowadays, authentication is required for both physical access to buildings and...
International audienceNowadays, authentication is required for both physical access to buildings and...
ENGELSK: This thesis investigates the use of hand gestures as an additional modality in authenticati...
This project describes an authentication technique that is shoulder-surfing resistant. Shoulder sur...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
Mobile devices offer their users lots of possibilities and a feeling of freedom. However, this free-...
Eye-gaze and mid-air gestures are promising for resisting various types of side-channel attacks duri...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
Gestures are a topic of increasing interest in authentication and successful implementation as a sec...
Secure authentication on situated displays (e.g., to access sensitive information or to make purchas...
Abstract. We study the feasibility of leveraging the sensors embedded on mo-bile devices to enable a...
This paper studies the security and memorability of free-form multitouch gestures for mobile authent...
In this paper, we consider the problem of authentication on a smartphone, based on gestures. Specifi...
The rapid growth of accelerometer use on consumer electronics has brought an opportunity for unique ...
Biometrics are a convenient alternative to traditional forms of access control such as passwords and...
International audienceNowadays, authentication is required for both physical access to buildings and...
International audienceNowadays, authentication is required for both physical access to buildings and...