It is estimated that over 1 billion people are active mobile phone users in 2018. When using a mobile phone, there are a variety of ways to authenticate and “secure” the device, and biometric authentication is becoming an increasingly common way to do this, however, biometric authentication is not always as usable as it could be. Both usability and security are important, yet many people believe that there is a trade-off between the two. The focus of this paper was to better understand usability, computer security, and within computer security more specifically biometric authentication, and how all three can work together to create systems that are both usable and secure. A survey and interviews were conducted based on previous research to ...
Adequate user authentication is a persistent problem, particularly with mobile devices, which tend t...
A growing reliance upon mobile consumer devices over recent years has widened the gap between the de...
The increasing range of data and services accessible from mobile devices, such as cellphones and PDA...
Over the past few years, the usage of mobile devices to access data has becoming more frequent, and ...
Abstract—While biometrics have long been promoted as the future of authentication, the recent introd...
There is a very sensitive relation between usability and security of authentication methods. Both us...
Part 3: Biometrics and Biometrics ApplicationsInternational audienceThe paper is intended as a short...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Mobile devices are widely replacing the standard personal computers thanks to their small size and u...
We present the results of an MTurk survey (n = 383) on the reasons for using and not using biometric...
Mobile devices are widely replacing the standard personal computers thanks to their small size and u...
Biometrics play an avid role in today’s mobile security realm. Security experts have attempted...
We present the results of an MTurk survey (n=383) on the reasons for using and not using biometric a...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
Biometrics are biological measurements of an individual that can be used to identify them. This is c...
Adequate user authentication is a persistent problem, particularly with mobile devices, which tend t...
A growing reliance upon mobile consumer devices over recent years has widened the gap between the de...
The increasing range of data and services accessible from mobile devices, such as cellphones and PDA...
Over the past few years, the usage of mobile devices to access data has becoming more frequent, and ...
Abstract—While biometrics have long been promoted as the future of authentication, the recent introd...
There is a very sensitive relation between usability and security of authentication methods. Both us...
Part 3: Biometrics and Biometrics ApplicationsInternational audienceThe paper is intended as a short...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Mobile devices are widely replacing the standard personal computers thanks to their small size and u...
We present the results of an MTurk survey (n = 383) on the reasons for using and not using biometric...
Mobile devices are widely replacing the standard personal computers thanks to their small size and u...
Biometrics play an avid role in today’s mobile security realm. Security experts have attempted...
We present the results of an MTurk survey (n=383) on the reasons for using and not using biometric a...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
Biometrics are biological measurements of an individual that can be used to identify them. This is c...
Adequate user authentication is a persistent problem, particularly with mobile devices, which tend t...
A growing reliance upon mobile consumer devices over recent years has widened the gap between the de...
The increasing range of data and services accessible from mobile devices, such as cellphones and PDA...