Eye-gaze and mid-air gestures are promising for resisting various types of side-channel attacks during authentication. However, to date, a comparison of the different authentication modalities is missing. We investigate multiple authentication mechanisms that leverage gestures, eye gaze, and a multimodal combination of them and study their resilience to shoulder surfing. To this end, we report on our implementation of three schemes and results from usability and security evaluations where we also experimented with fixed and randomized layouts. We found that the gaze-based approach outperforms the other schemes in terms of input time, error rate, perceived workload, and resistance to observation attacks, and that randomizing the layout does ...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...
Secure authentication on situated displays (e.g., to access sensitive information or to make purchas...
The use of authentication systems has increased significantly due to the advancement of technology, ...
We propose a multimodal scheme, GazeTouchPass, that combines gaze and touch for shoulder-surfing res...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Shoulder-surfing – using direct observation techniques, such as looking over someone's shoulder...
ENGELSK: This thesis investigates the use of hand gestures as an additional modality in authenticati...
This project describes an authentication technique that is shoulder-surfing resistant. Shoulder sur...
We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...
Secure authentication on situated displays (e.g., to access sensitive information or to make purchas...
The use of authentication systems has increased significantly due to the advancement of technology, ...
We propose a multimodal scheme, GazeTouchPass, that combines gaze and touch for shoulder-surfing res...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Eye tracking devices have recently become increasingly popular as an interface between people and co...
Shoulder-surfing – using direct observation techniques, such as looking over someone's shoulder...
ENGELSK: This thesis investigates the use of hand gestures as an additional modality in authenticati...
This project describes an authentication technique that is shoulder-surfing resistant. Shoulder sur...
We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...