Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. Gesture passwords have been proposed as an alternative ubiquitous authentication technique. Gesture authentication relies on recognition, wherein raw data is collected from user input and recognized by measuring the similarity between gestures with different algorithms. Our work analyzed the different aspects of gesture password security. First, since preprocessing in gesture recognizers is implemented to improve recognition accuracy, we examined the effects of three variables in preprocessing: location, rotation, and scale. We found that an authentication-optimal combination (location invariant, scale variant, and rotation variant) reduced th...
Abstract. We study the feasibility of leveraging the sensors embedded on mo-bile devices to enable a...
In this paper, we consider the problem of authentication on a smartphone, based on gestures. Specifi...
Research in user authentication has been a growing field in HCI. Previous studies have shown that pe...
Touchscreen gestures are attracting research attention as an authentication method. While studies ha...
Gestures are a topic of increasing interest in authentication and successful implementation as a sec...
This paper studies the security and memorability of free-form multitouch gestures for mobile authent...
Research on gesture passwords suggest they are highly usable and secure, leading them to be proposed...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
Biometrics are a convenient alternative to traditional forms of access control such as passwords and...
The most common approach to authentication involves a password entered on a keyboard with letters, n...
This article evaluates an authentication technique for mobiles based on gestures. Users create a rem...
Text passwords are still the primary authentication mechanism for computers and online systems world...
ENGELSK: This thesis investigates the use of hand gestures as an additional modality in authenticati...
Picture gesture authentication has been recently introduced as an alternative login experience to te...
Abstract. We study the feasibility of leveraging the sensors embedded on mo-bile devices to enable a...
In this paper, we consider the problem of authentication on a smartphone, based on gestures. Specifi...
Research in user authentication has been a growing field in HCI. Previous studies have shown that pe...
Touchscreen gestures are attracting research attention as an authentication method. While studies ha...
Gestures are a topic of increasing interest in authentication and successful implementation as a sec...
This paper studies the security and memorability of free-form multitouch gestures for mobile authent...
Research on gesture passwords suggest they are highly usable and secure, leading them to be proposed...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
Biometrics are a convenient alternative to traditional forms of access control such as passwords and...
The most common approach to authentication involves a password entered on a keyboard with letters, n...
This article evaluates an authentication technique for mobiles based on gestures. Users create a rem...
Text passwords are still the primary authentication mechanism for computers and online systems world...
ENGELSK: This thesis investigates the use of hand gestures as an additional modality in authenticati...
Picture gesture authentication has been recently introduced as an alternative login experience to te...
Abstract. We study the feasibility of leveraging the sensors embedded on mo-bile devices to enable a...
In this paper, we consider the problem of authentication on a smartphone, based on gestures. Specifi...
Research in user authentication has been a growing field in HCI. Previous studies have shown that pe...