Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3623509.3633360acmconferencesArticle/Chapter ViewAbstractPublication PagesteiConference Proceedingsconference-collections
research-article

Act2Auth – A Novel Authentication Concept based on Embedded Tangible Interaction at Desks

Published: 11 February 2024 Publication History

Abstract

Authentication (e.g., entering a password) is frequently perceived as an annoying obstacle when interacting with computational devices, but still essential to protect sensitive data from unauthorized access. We present Act2Auth, a novel concept for embedding authentication into users’ established routines by sensing tangible interactions at desks. With Act2Auth, users can authenticate by performing (secret) routines, such as putting a cup on their desk, rearranging their keyboard, and touching their mouse. The Act2Auth concept is informed by (1) an object analysis of 107 desk photos from Reddit, (2) an online survey (N = 65) investigating users’ strategies for creating touch-based authentication secrets, and (3) a technical exploration of capacitive touch-sensing at desks. We then (4) implemented a prototype and evaluated the usability as well as the memorability of Act2Auth compared to textual passwords (N = 8). With Act2Auth, we provide fundamental work on how to embed authentication tasks into our daily tangible interactions.

Supplemental Material

ZIP File
Video Figure and Closed Captions

References

[1]
Ghazanfer Abbas, Shah Rukh Humayoun, Ragaad AlTarawneh, and Achim Ebert. 2018. Simple Shape-Based Touch Behavioral Biometrics Authentication for Smart Mobiles. In Proceedings of the 2018 International Conference on Advanced Visual Interfaces (Castiglione della Pescaia, Grosseto, Italy) (AVI ’18). Association for Computing Machinery, New York, NY, USA, Article 50, 3 pages. https://doi.org/10.1145/3206505.3206571
[2]
Anne Adams and Martina Angela Sasse. 1999. Users Are Not the Enemy. Commun. ACM 42, 12 (dec 1999), 40–46. https://doi.org/10.1145/322796.322806
[3]
F. A. Alsulaiman and A. El Saddik. 2008. Three-Dimensional Password for More Secure Authentication. IEEE Transactions on Instrumentation and Measurement 57, 9 (Sep. 2008), 1929–1938. https://doi.org/10.1109/TIM.2008.919905
[4]
Szilvia Balogh, Tobias Daniel, Sarah Delgado Rodriguez, Ismael Prieto Romero, and Florian Alt. 2022. Rubik’s Cube Auth - A Tangible Authentication Mechanism Using A Standard Rubik’s Cube. In Mensch und Computer 2022 - Workshopband. Gesellschaft für Informatik e.V., Bonn.
[5]
Francesco Bergadano, Daniele Gunetti, and Claudia Picardi. 2002. User Authentication through Keystroke Dynamics. ACM Trans. Inf. Syst. Secur. 5, 4 (nov 2002), 367–397. https://doi.org/10.1145/581271.581272
[6]
Rasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe, Lorrie Faith Cranor, and Marios Savvides. 2015. Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption. (2015).
[7]
Virginia Braun and Victoria Clarke. 2012. Thematic analysis. (2012).
[8]
Heather Crawford and Karen Renaud. 2014. Understanding user perceptions of transparent authentication on a mobile device. Journal of Trust Management 1 (2014), 1–28.
[9]
Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann. 2012. Touch Me Once and i Know It’s You! Implicit Authentication Based on Touch Screen Patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Austin, Texas, USA) (CHI ’12). Association for Computing Machinery, New York, NY, USA, 987–996. https://doi.org/10.1145/2207676.2208544
[10]
Sarah Delgado Rodriguez, Lukas Mecke, and Florian Alt. 2022. SenseHandle: Investigating Human-Door Interaction Behaviour for Authentication in the Physical World. In USENIX Symposium on Usable Privacy and Security (SOUPS). 7–9.
[11]
Sarah Delgado Rodriguez, Sarah Prange, Lukas Mecke, and Florian Alt. 2021. ActPad– A Smart Desk Platform to Enable User Interaction with IoT Devices. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI EA ’21). Association for Computing Machinery, New York, NY, USA, Article 325, 6 pages. https://doi.org/10.1145/3411763.3451825
[12]
Paul H. Dietz and Benjamin D. Eidelson. 2009. SurfaceWare: Dynamic Tagging for Microsoft Surface. In Proceedings of the 3rd International Conference on Tangible and Embedded Interaction (Cambridge, United Kingdom) (TEI ’09). Association for Computing Machinery, New York, NY, USA, 249–254. https://doi.org/10.1145/1517664.1517717
[13]
Jayesh Doolani, Matthew Wright, Rajesh Setty, and S M Taiabul Haque. 2021. LociMotion: Towards Learning a Strong Authentication Secret in a Single Session. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 689, 13 pages. https://doi.org/10.1145/3411764.3445105
[14]
Rainhard Dieter Findling, Muhammad Muaaz, Daniel Hintze, and René Mayrhofer. 2017. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices. IEEE Transactions on Mobile Computing 16, 4 (2017), 1163–1175. https://doi.org/10.1109/TMC.2016.2582489
[15]
Kyosuke Futami, Akari Fukao, and Kazuya Murao. 2019. A Method to Recognize Entering and Leaving Person Based on Door Opening and Closing Movement Using Angular Velocity Sensor. In Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers (London, United Kingdom) (UbiComp/ISWC ’19 Adjunct). Association for Computing Machinery, New York, NY, USA, 57–60. https://doi.org/10.1145/3341162.3343798
[16]
Ceenu George, Mohamed Khamis, Daniel Buschek, and Heinrich Hussmann. 2019. Investigating the Third Dimension for Authentication in Immersive Virtual Reality and in the Real World. In 2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). 277–285. https://doi.org/10.1109/VR.2019.8797862
[17]
Tobias Grosse-Puppendahl, Yannick Berghoefer, Andreas Braun, Raphael Wimmer, and Arjan Kuijper. 2013. OpenCapSense: A rapid prototyping toolkit for pervasive interaction using capacitive sensing. In 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom) (San Diego, CA, USA) (PerCom ’13). IEEE, 152–159.
[18]
Tobias Grosse-Puppendahl, Sebastian Herber, Raphael Wimmer, Frank Englert, Sebastian Beck, Julian von Wilmsdorff, Reiner Wichert, and Arjan Kuijper. 2014. Capacitive Near-Field Communication for Ubiquitous Interaction and Perception. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Seattle, Washington) (UbiComp ’14). Association for Computing Machinery, New York, NY, USA, 231–242. https://doi.org/10.1145/2632048.2632053
[19]
Sandeep Gupta, Attaullah Buriro, and Bruno Crispo. 2019. SmartHandle: A Novel Behavioral Biometric-Based Authentication Scheme for Smart Lock Systems. In Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications (Stockholm, Sweden) (ICBEA 2019). Association for Computing Machinery, New York, NY, USA, 15–22. https://doi.org/10.1145/3345336.3345344
[20]
Jun Han, Shijia Pan, Manal Kumar Sinha, Hae Young Noh, Pei Zhang, and Patrick Tague. 2017. Sensetribute: Smart Home Occupant Identification via Fusion across on-Object Sensing Devices. In Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments (Delft, Netherlands) (BuildSys ’17). Association for Computing Machinery, New York, NY, USA, Article 2, 10 pages. https://doi.org/10.1145/3137133.3137152
[21]
Marian Harbach, Alexander De Luca, and Serge Egelman. 2016. The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI ’16). Association for Computing Machinery, New York, NY, USA, 4806–4817. https://doi.org/10.1145/2858036.2858267
[22]
Chiung Ching Ho, C. Eswaran, Kok-Why Ng, and June-Yee Leow. 2012. An Unobtrusive Android Person Verification Using Accelerometer Based Gait. In Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia (Bali, Indonesia) (MoMM ’12). Association for Computing Machinery, New York, NY, USA, 271–274. https://doi.org/10.1145/2428955.2429007
[23]
Christian Holz and Marius Knaust. 2015. Biometric Touch Sensing: Seamlessly Augmenting Each Touch with Continuous Authentication. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (Charlotte, NC, USA) (UIST ’15). Association for Computing Machinery, New York, NY, USA, 303–312. https://doi.org/10.1145/2807442.2807458
[24]
Sergi Jordà, Günter Geiger, Marcos Alonso, and Martin Kaltenbrunner. 2007. The ReacTable: Exploring the Synergy between Live Music Performance and Tabletop Tangible Interfaces. In Proceedings of the 1st International Conference on Tangible and Embedded Interaction (Baton Rouge, Louisiana) (TEI ’07). Association for Computing Machinery, New York, NY, USA, 139–146. https://doi.org/10.1145/1226969.1226998
[25]
Zach Jorgensen and Ting Yu. 2011. On Mouse Dynamics as a Behavioral Biometric for Authentication. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (Hong Kong, China) (ASIACCS ’11). Association for Computing Machinery, New York, NY, USA, 476–482. https://doi.org/10.1145/1966913.1966983
[26]
Zach Jorgensen and Ting Yu. 2011. On Mouse Dynamics as a Behavioral Biometric for Authentication. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (Hong Kong, China) (ASIACCS ’11). Association for Computing Machinery, New York, NY, USA, 476–482. https://doi.org/10.1145/1966913.1966983
[27]
Hassan Khan, Urs Hengartner, and Daniel Vogel. 2015. Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 225–239. https://www.usenix.org/conference/soups2015/proceedings/presentation/khan
[28]
Tomi Kinnunen, Filip Sedlak, and Roman Bednarik. 2010. Towards Task-Independent Person Authentication Using Eye Movement Signals. In Proceedings of the 2010 Symposium on Eye-Tracking Research & Applications (Austin, Texas) (ETRA ’10). Association for Computing Machinery, New York, NY, USA, 187–190. https://doi.org/10.1145/1743666.1743712
[29]
Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, and Pranjal Rathod. 2013. Secure authentication with 3D password. International Journal of Engineering Science and Innovative Technology (IJESIT) 2, 2 (2013), 99–105.
[30]
Andraž Krašovec, Daniel Pellarini, Dimitrios Geneiatakis, Gianmarco Baldini, and Veljko Pejović. 2020. Not Quite Yourself Today: Behaviour-Based Continuous Authentication in IoT Environments. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4, 4, Article 136 (dec 2020), 29 pages. https://doi.org/10.1145/3432206
[31]
Sowndarya Krishnamoorthy, Luis Rueda, Sherif Saad, and Haytham Elmiligi. 2018. Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning. In Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications (Amsterdam, Netherlands) (ICBEA ’18). Association for Computing Machinery, New York, NY, USA, 50–57. https://doi.org/10.1145/3230820.3230829
[32]
Juho Leinonen, Krista Longi, Arto Klami, Alireza Ahadi, and Arto Vihavainen. 2016. Typing Patterns and Authentication in Practical Programming Exams. In Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education (Arequipa, Peru) (ITiCSE ’16). Association for Computing Machinery, New York, NY, USA, 160–165. https://doi.org/10.1145/2899415.2899472
[33]
J. Leitner, M. Haller, K. Yun, W. Woo, M. Sugimoto, M. Inami, A. D. Cheok, and H. D. Been-Lirn. 2010. Physical Interfaces for Tabletop Games. Comput. Entertain. 7, 4, Article 61 (jan 2010), 21 pages. https://doi.org/10.1145/1658866.1658880
[34]
Xiaopeng Li, Fengyao Yan, Fei Zuo, Qiang Zeng, and Lannan Luo. 2019. Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices. In The 25th Annual International Conference on Mobile Computing and Networking (Los Cabos, Mexico) (MobiCom ’19). Association for Computing Machinery, New York, NY, USA, Article 33, 17 pages. https://doi.org/10.1145/3300061.3345434
[35]
Jonathan Liebers, Uwe Gruenefeld, Daniel Buschek, Florian Alt, and Stefan Schneegass. 2023. Introduction to Authentication Using Behavioral Biometrics. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (Hamburg, Germany) (CHI EA ’23). Association for Computing Machinery, New York, NY, USA, Article 547, 4 pages. https://doi.org/10.1145/3544549.3574190
[36]
Jonathan Liebers, Patrick Horn, Christian Burschik, Uwe Gruenefeld, and Stefan Schneegass. 2021. Using Gaze Behavior and Head Orientation for Implicit Identification in Virtual Reality. In Proceedings of the 27th ACM Symposium on Virtual Reality Software and Technology (Osaka, Japan) (VRST ’21). Association for Computing Machinery, New York, NY, USA, Article 22, 9 pages. https://doi.org/10.1145/3489849.3489880
[37]
Sana Maqsood, Sonia Chiasson, and Audrey Girouard. 2016. Bend Passwords: using gestures to authenticate on flexible devices. Personal and Ubiquitous Computing 20 (2016), 573–600.
[38]
Karola Marky, Martin Schmitz, Verena Zimmermann, Martin Herbers, Kai Kunze, and Max Mühlhäuser. 2020. 3D-Auth: Two-Factor Authentication with Personalized 3D-Printed Items. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3313831.3376189
[39]
Lukas Mecke, Ken Pfeuffer, Sarah Prange, and Florian Alt. 2018. Open Sesame! User Perception of Physical, Biometric, and Behavioural Authentication Concepts to Open Doors. In Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia (Cairo, Egypt) (MUM ’18). Association for Computing Machinery, New York, NY, USA, 153–159. https://doi.org/10.1145/3282894.3282923
[40]
Martez Mott, Thomas Donahue, G. Michael Poor, and Laura Leventhal. 2012. Leveraging Motor Learning for a Tangible Password System. In CHI ’12 Extended Abstracts on Human Factors in Computing Systems (Austin, Texas, USA) (CHI EA ’12). Association for Computing Machinery, New York, NY, USA, 2597–2602. https://doi.org/10.1145/2212776.2223842
[41]
Muhammad Muaaz and René Mayrhofer. 2013. An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers. In Proceedings of International Conference on Advances in Mobile Computing & Multimedia (Vienna, Austria) (MoMM ’13). Association for Computing Machinery, New York, NY, USA, 293–300. https://doi.org/10.1145/2536853.2536895
[42]
Muhammad Muaaz and René Mayrhofer. 2014. Orientation Independent Cell Phone Based Gait Authentication. In Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (Kaohsiung, Taiwan) (MoMM ’14). Association for Computing Machinery, New York, NY, USA, 161–164. https://doi.org/10.1145/2684103.2684152
[43]
L. O’Gorman. 2003. Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91, 12 (Dec 2003), 2021–2040. https://doi.org/10.1109/JPROC.2003.819611
[44]
Makoto Ono, Buntarou Shizuki, and Jiro Tanaka. 2013. Touch & Activate: Adding Interactivity to Existing Objects Using Active Acoustic Sensing. In Proceedings of the 26th Annual ACM Symposium on User Interface Software and Technology (St. Andrews, Scotland, United Kingdom) (UIST ’13). Association for Computing Machinery, New York, NY, USA, 31–40. https://doi.org/10.1145/2501988.2501989
[45]
Maja Pusara and Carla E. Brodley. 2004. User Re-Authentication via Mouse Movements. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (Washington DC, USA) (VizSEC/DMSEC ’04). Association for Computing Machinery, New York, NY, USA, 1–8. https://doi.org/10.1145/1029208.1029210
[46]
Sarah Delgado Rodriguez, Oliver Hein, Ismael Prieto Romero, Lukas Mecke, Felix Dietz, Sarah Prange, and Florian Alt. 2023. Shake-It-All: A Toolkit for Sensing Tangible Interactions on Everyday Objects. (2023).
[47]
Valkyrie Savage, Xiaohan Zhang, and Björn Hartmann. 2012. Midas: Fabricating Custom Capacitive Touch Sensors to Prototype Interactive Objects. In Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology (Cambridge, Massachusetts, USA) (UIST ’12). Association for Computing Machinery, New York, NY, USA, 579–588. https://doi.org/10.1145/2380116.2380189
[48]
Martin Schmitz, Mohammadreza Khalilbeigi, Matthias Balwierz, Roman Lissermann, Max Mühlhäuser, and Jürgen Steimle. 2015. Capricate: A Fabrication Pipeline to Design and 3D Print Capacitive Touch Sensors for Interactive Objects. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (Charlotte, NC, USA) (UIST ’15). Association for Computing Machinery, New York, NY, USA, 253–258. https://doi.org/10.1145/2807442.2807503
[49]
Martin Schmitz, Florian Müller, Max Mühlhäuser, Jan Riemann, and Huy Viet Viet Le. 2021. Itsy-Bits: Fabrication and Recognition of 3D-Printed Tangibles with Small Footprints on Capacitive Touchscreens. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 419, 12 pages. https://doi.org/10.1145/3411764.3445502
[50]
D. Schweitzer, J. Boleng, C. Hughes, and L. Murphy. 2009. Visualizing keyboard pattern passwords. In 2009 6th International Workshop on Visualization for Cyber Security. 69–73.
[51]
Ivo Sluganovic, Marc Roeschlin, Kasper B. Rasmussen, and Ivan Martinovic. 2016. Using Reflexive Eye Movements for Fast Challenge-Response Authentication. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Vienna, Austria) (CCS ’16). Association for Computing Machinery, New York, NY, USA, 1056–1067. https://doi.org/10.1145/2976749.2978311
[52]
Anil Somayaji, David Mould, and Carson Brown. 2013. Towards Narrative Authentication: Or, against Boring Authentication. In Proceedings of the 2013 New Security Paradigms Workshop (Banff, Alberta, Canada) (NSPW ’13). Association for Computing Machinery, New York, NY, USA, 57–64. https://doi.org/10.1145/2535813.2535820
[53]
Blase Ur, Fumiko Noma, Jonathan Bees, Sean M Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2015. " I Added’!’at the End to Make It Secure": Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security ({ SOUPS} 2015). 123–140.
[54]
Nicolas Villar, Daniel Cletheroe, Greg Saul, Christian Holz, Tim Regan, Oscar Salandin, Misha Sra, Hui-Shyong Yeo, William Field, and Haiyan Zhang. 2018. Project Zanzibar: A Portable and Flexible Tangible Interaction Platform. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI ’18). Association for Computing Machinery, New York, NY, USA, Article 515, 13 pages. https://doi.org/10.1145/3173574.3174089
[55]
Simon Voelker, Christian Cherek, Jan Thar, Thorsten Karrer, Christian Thoresen, Kjell Ivar Øvergård, and Jan Borchers. 2015. PERCs: Persistently Trackable Tangibles on Capacitive Multi-Touch Displays. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (Charlotte, NC, USA) (UIST ’15). Association for Computing Machinery, New York, NY, USA, 351–356. https://doi.org/10.1145/2807442.2807466
[56]
Simon Voelker, Kosuke Nakajima, Christian Thoresen, Yuichi Itoh, Kjell Ivar Øvergård, and Jan Borchers. 2013. PUCs: Detecting Transparent, Passive Untouched Capacitive Widgets on Unmodified Multi-Touch Displays. In Proceedings of the 2013 ACM International Conference on Interactive Tabletops and Surfaces (St. Andrews, Scotland, United Kingdom) (ITS ’13). Association for Computing Machinery, New York, NY, USA, 101–104. https://doi.org/10.1145/2512349.2512791
[57]
Dirk Weirich and Martina Angela Sasse. 2001. Pretty Good Persuasion: A First Step towards Effective Password Security in the Real World. In Proceedings of the 2001 Workshop on New Security Paradigms (Cloudcroft, New Mexico) (NSPW ’01). Association for Computing Machinery, New York, NY, USA, 137–143. https://doi.org/10.1145/508171.508195
[58]
Mark Weiser and John Seely Brown. 1996. Designing calm technology. PowerGrid Journal 1, 1 (1996), 75–85.
[59]
Roman Weiss and Alexander De Luca. 2008. PassShapes: Utilizing Stroke Based Authentication to Increase Password Memorability. In Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges (Lund, Sweden) (NordiCHI ’08). Association for Computing Machinery, New York, NY, USA, 383–392. https://doi.org/10.1145/1463160.1463202
[60]
Pierre Wellner. 1991. The DigitalDesk Calculator: Tangible Manipulation on a Desk Top Display. In Proceedings of the 4th Annual ACM Symposium on User Interface Software and Technology (Hilton Head, South Carolina, USA) (UIST ’91). Association for Computing Machinery, New York, NY, USA, 27–33. https://doi.org/10.1145/120782.120785
[61]
Pierre Wellner, Wendy Mackay, and Rich Gold. 1993. Back to the Real World. Commun. ACM 36, 7 (jul 1993), 24–26. https://doi.org/10.1145/159544.159555
[62]
EJ Williams. 1949. Experimental designs balanced for the estimation of residual effects of treatments. Australian Journal of Chemistry 2, 2 (1949), 149–168.
[63]
Raphael Wimmer, Matthias Kranz, Sebastian Boring, and Albrecht Schmidt. 2007. A Capacitive Sensing Toolkit for Pervasive Activity Detection and Recognition. In Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom’07). 171–180. https://doi.org/10.1109/PERCOM.2007.1
[64]
Simon S. Woo, Ron Artstein, Elsi Kaiser, Xiao Le, and Jelena Mirkovic. 2019. Using Episodic Memory for User Authentication. ACM Trans. Priv. Secur. 22, 2, Article 11 (April 2019), 34 pages. https://doi.org/10.1145/3308992
[65]
Chuxiong Wu, Xiaopeng Li, Fei Zuo, Lannan Luo, Xiaojiang Du, Jia Di, and Qiang Zeng. 2022. Use It-No Need to Shake It! Accurate Implicit Authentication for Everyday Objects with Smart Sensing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6, 3, Article 146 (sep 2022), 25 pages. https://doi.org/10.1145/3550322
[66]
J. Yan, A. Blackwell, R. Anderson, and A. Grant. 2004. Password memorability and security: empirical results. IEEE Security Privacy 2, 5 (2004), 25–31.
[67]
Zhenyu Yan, Qun Song, Rui Tan, Yang Li, and Adams Wai Kin Kong. 2019. Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials. In The 25th Annual International Conference on Mobile Computing and Networking (Los Cabos, Mexico) (MobiCom ’19). Association for Computing Machinery, New York, NY, USA, Article 23, 16 pages. https://doi.org/10.1145/3300061.3300118
[68]
Marina Zamsheva, Ingo Deutschmann, David Julitz, and Andreas Bienert. 2020. Person Authentication with BehavioSense Using Keystroke Biometrics. In Proceedings of the 2020 International Conference on Pattern Recognition and Intelligent Systems (Athens, Greece) (PRIS 2020). Association for Computing Machinery, New York, NY, USA, Article 23, 6 pages. https://doi.org/10.1145/3415048.3416118
[69]
Yongtuo Zhang, Wen Hu, Weitao Xu, Chun Tung Chou, and Jiankun Hu. 2018. Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 4, Article 177 (jan 2018), 22 pages. https://doi.org/10.1145/3161410

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
TEI '24: Proceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction
February 2024
1058 pages
ISBN:9798400704024
DOI:10.1145/3623509
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 February 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. capacitive sensing
  2. embedded authentication
  3. tangible authentication
  4. tangible security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Data Availability

Funding Sources

  • dtec.bw - Center for Digitization and Technology Research of the Bundeswehr
  • German Research Foundation
  • European Union - NextGeneration EU

Conference

TEI '24
Sponsor:

Acceptance Rates

Overall Acceptance Rate 393 of 1,367 submissions, 29%

Upcoming Conference

TEI '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 225
    Total Downloads
  • Downloads (Last 12 months)225
  • Downloads (Last 6 weeks)14
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media