Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites
AS Albesher - Sustainability, 2023 - mdpi.com
A sustainable online environment is essential to protecting businesses from abuse and data
breaches. To protect sustainability, websites' authentication procedures should continuously …
breaches. To protect sustainability, websites' authentication procedures should continuously …
” Your Eyes Tell You Have Used This Password Before”: Identifying Password Reuse from Gaze and Keystroke Dynamics
A significant drawback of text passwords for end-user authentication is password reuse. We
propose a novel approach to detect password reuse by leveraging gaze as well as ty** …
propose a novel approach to detect password reuse by leveraging gaze as well as ty** …
Pupil dilation as cognitive load measure in instructional videos on complex chemical representations
This secondary analysis of an earlier eye-tracking experiment investigated how triangulating
changes in pupil dilation with student-self reports can be used as a measure of cognitive …
changes in pupil dilation with student-self reports can be used as a measure of cognitive …
Uncovering and Addressing Blink-Related Challenges in Using Eye Tracking for Interactive Systems
Currently, interactive systems use physiological sensing to enable advanced functionalities.
While eye tracking is a promising means to understand the user, eye tracking data inherently …
While eye tracking is a promising means to understand the user, eye tracking data inherently …
SoK: Web Authentication in the Age of End-to-End Encryption
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …
new challenges for usable authentication. Compared to regular web services, the nature of …
Toward secure mobile applications through proper authentication mechanisms
With the increased number of mobile apps, authentication processes play a key role in
verifying users' identities and protecting data from security threats. Utilizing proper …
verifying users' identities and protecting data from security threats. Utilizing proper …
Top Reported Data Security Risks in the Age of COVID-19
Data has been collected and stored for thousands of years. Securing data during the digital
age has remained difficult. Research shows that in 2018 there was over 33 zettabytes of …
age has remained difficult. Research shows that in 2018 there was over 33 zettabytes of …
Examining the Strength of Three Word Passwords
Passwords make up the most common method of authentication. With ever increasing
computing power, password complexity has had to keep pace. This creates a challenge for …
computing power, password complexity has had to keep pace. This creates a challenge for …
A temporally quantized distribution of pupil diameters as a new feature for cognitive load classification
In this paper, we present a new feature that can be used to classify cognitive load based on
pupil information. The feature consists of a temporal segmentation of the eye tracking …
pupil information. The feature consists of a temporal segmentation of the eye tracking …
Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects
L Qu, R **ao, W Shi - International Conference on Science of Cyber …, 2022 - Springer
The concept of “personalized security nudges” promises to solve the contradictions between
people's heterogeneity and one-size-fits-all security nudges, whereas the psychological …
people's heterogeneity and one-size-fits-all security nudges, whereas the psychological …