Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites

AS Albesher - Sustainability, 2023 - mdpi.com
A sustainable online environment is essential to protecting businesses from abuse and data
breaches. To protect sustainability, websites' authentication procedures should continuously …

” Your Eyes Tell You Have Used This Password Before”: Identifying Password Reuse from Gaze and Keystroke Dynamics

Y Abdrabou, J Schütte, A Shams, K Pfeuffer… - Proceedings of the …, 2022 - dl.acm.org
A significant drawback of text passwords for end-user authentication is password reuse. We
propose a novel approach to detect password reuse by leveraging gaze as well as ty** …

Pupil dilation as cognitive load measure in instructional videos on complex chemical representations

M Rodemer, J Karch, S Bernholt - Frontiers in Education, 2023 - frontiersin.org
This secondary analysis of an earlier eye-tracking experiment investigated how triangulating
changes in pupil dilation with student-self reports can be used as a measure of cognitive …

Uncovering and Addressing Blink-Related Challenges in Using Eye Tracking for Interactive Systems

JW Grootjen, H Weingärtner, S Mayer - Proceedings of the CHI …, 2024 - dl.acm.org
Currently, interactive systems use physiological sensing to enable advanced functionalities.
While eye tracking is a promising means to understand the user, eye tracking data inherently …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arxiv preprint arxiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

Toward secure mobile applications through proper authentication mechanisms

AS Albesher, A Alkhaldi, A Aljughaiman - PloS one, 2024 - journals.plos.org
With the increased number of mobile apps, authentication processes play a key role in
verifying users' identities and protecting data from security threats. Utilizing proper …

Top Reported Data Security Risks in the Age of COVID-19

S Schmeelk, K Thakur, ML Ali… - 2021 IEEE 12th …, 2021 - ieeexplore.ieee.org
Data has been collected and stored for thousands of years. Securing data during the digital
age has remained difficult. Research shows that in 2018 there was over 33 zettabytes of …

Examining the Strength of Three Word Passwords

W Fraser, M Broadbent, N Pitropakis… - … Conference on ICT …, 2024 - Springer
Passwords make up the most common method of authentication. With ever increasing
computing power, password complexity has had to keep pace. This creates a challenge for …

A temporally quantized distribution of pupil diameters as a new feature for cognitive load classification

W Fuhl, A Herrmann-Werner, K Nieselt - … of the 2023 Symposium on Eye …, 2023 - dl.acm.org
In this paper, we present a new feature that can be used to classify cognitive load based on
pupil information. The feature consists of a temporal segmentation of the eye tracking …

Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects

L Qu, R **ao, W Shi - International Conference on Science of Cyber …, 2022 - Springer
The concept of “personalized security nudges” promises to solve the contradictions between
people's heterogeneity and one-size-fits-all security nudges, whereas the psychological …