As new technologies emerge such as wearables, it opens up for new challenges, especially related to security and privacy. One such recent technology is smart glasses. The use of glasses introduces security and privacy concerns for the general public but also for the user itself. In this paper we present ongoing theoretical work which focus on privacy of the user during authentication. We propose and analyze two methods, visual cryptography and obfuscation for protecting the user against HUD and camera logging adversaries as well as shoulder-surfing
Mixed reality devices continuously scan their environment in order to naturally blend the virtual o...
Ideally, secure user sessions should start and end with authentication and de-authentication phases,...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...
As new technologies emerge such as wearables, it opens up for new challenges, especially related to ...
In this paper, we present a case study of potential security and privacy threats from virtual realit...
We introduce EyeDecrypt, a novel technology for privacy-preserving human-computer interaction. EyeDe...
Wearable technologies such as smart-glasses can sense, store and display sensitive personal contents...
Visual cryptography is cryptographic method allowing data to be stored in encrypted format were any ...
We evaluate the possibility of a human receiving a secret message while trusting no device with the ...
Using passwords only has rapidly become a security risk. Another approach to security is visual cryp...
peer reviewedSmart and wearable devices are trendy electronic objects that have become increasingly ...
Abstract—It is of great importance to preserve the privacy of biometric data stored in the central d...
International audienceSmart and wearable devices are trendy electronic objects that have become incr...
Existing approaches for mobile authentication are prone to shoulder-surfing and side-channel attacks...
Visual cryptography is cryptographic methodallowing data to be stored in encrypted format were any i...
Mixed reality devices continuously scan their environment in order to naturally blend the virtual o...
Ideally, secure user sessions should start and end with authentication and de-authentication phases,...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...
As new technologies emerge such as wearables, it opens up for new challenges, especially related to ...
In this paper, we present a case study of potential security and privacy threats from virtual realit...
We introduce EyeDecrypt, a novel technology for privacy-preserving human-computer interaction. EyeDe...
Wearable technologies such as smart-glasses can sense, store and display sensitive personal contents...
Visual cryptography is cryptographic method allowing data to be stored in encrypted format were any ...
We evaluate the possibility of a human receiving a secret message while trusting no device with the ...
Using passwords only has rapidly become a security risk. Another approach to security is visual cryp...
peer reviewedSmart and wearable devices are trendy electronic objects that have become increasingly ...
Abstract—It is of great importance to preserve the privacy of biometric data stored in the central d...
International audienceSmart and wearable devices are trendy electronic objects that have become incr...
Existing approaches for mobile authentication are prone to shoulder-surfing and side-channel attacks...
Visual cryptography is cryptographic methodallowing data to be stored in encrypted format were any i...
Mixed reality devices continuously scan their environment in order to naturally blend the virtual o...
Ideally, secure user sessions should start and end with authentication and de-authentication phases,...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...