With the increasing adoption of virtual reality (VR) in public spaces, protecting users from observation attacks is becoming essential to prevent attackers from accessing context-sensitive data or performing malicious payment transactions in VR. In this work, we propose RubikBiom, a knowledge-driven behavioural biometric authentication scheme for authentication in VR. We show that hand movement patterns performed during interactions with a knowledge-based authentication scheme (e.g., when entering a PIN) can be leveraged to establish an additional security layer. Based on a dataset gathered in a lab study with 23 participants, we show that knowledge-driven behavioural biometric authentication increases security in an unobtrusive way. We ach...
AbstractThe purpose of this paper is to validate a method of collecting and analyzing behavioral bio...
Many devices include biometrics-based user authentication in addition to secret-based authentication...
In information systems, authentication involves, traditionally, sharing a secret with the authentica...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Virtual reality (VR) has advanced rapidly ...
There is a growing need for usable and secure authentication in virtual reality (VR). Established co...
There is a growing need for usable and secure authentication in immersive virtual reality (VR). Esta...
Augmented and Virtual Reality (AR/VR) technology has advanced significantly in recent years, with re...
In recent years, behavioural biometrics have become increasingly popular, with many types of behavio...
Existing virtual reality (VR) authentication schemes are either slow or prone to observation attacks...
Authentication plays a key role in securing various resources including corporate facilities or elec...
28 páginas, 4 figurasIn recent years, the development and design of reliable, secure, and usable use...
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For exam...
Robust user authentication on small form-factor and resource-constrained smart devices, such as smar...
A$ Virtual Reality (VR) becomes increasingly popular and affordable, and is applied in other fields ...
We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of...
AbstractThe purpose of this paper is to validate a method of collecting and analyzing behavioral bio...
Many devices include biometrics-based user authentication in addition to secret-based authentication...
In information systems, authentication involves, traditionally, sharing a secret with the authentica...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Virtual reality (VR) has advanced rapidly ...
There is a growing need for usable and secure authentication in virtual reality (VR). Established co...
There is a growing need for usable and secure authentication in immersive virtual reality (VR). Esta...
Augmented and Virtual Reality (AR/VR) technology has advanced significantly in recent years, with re...
In recent years, behavioural biometrics have become increasingly popular, with many types of behavio...
Existing virtual reality (VR) authentication schemes are either slow or prone to observation attacks...
Authentication plays a key role in securing various resources including corporate facilities or elec...
28 páginas, 4 figurasIn recent years, the development and design of reliable, secure, and usable use...
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For exam...
Robust user authentication on small form-factor and resource-constrained smart devices, such as smar...
A$ Virtual Reality (VR) becomes increasingly popular and affordable, and is applied in other fields ...
We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of...
AbstractThe purpose of this paper is to validate a method of collecting and analyzing behavioral bio...
Many devices include biometrics-based user authentication in addition to secret-based authentication...
In information systems, authentication involves, traditionally, sharing a secret with the authentica...