The role of eye gaze in security and privacy applications: Survey and future HCI research directions
For the past 20 years, researchers have investigated the use of eye tracking in security
applications. We present a holistic view on gaze-based security applications. In particular …
applications. We present a holistic view on gaze-based security applications. In particular …
[HTML][HTML] Shoulder surfing experiments: A systematic literature review
In search of the silver bullet to solve the password problem, the field of knowledge-based
authentication has become bloated with novel proposals aiming to replace textual …
authentication has become bloated with novel proposals aiming to replace textual …
Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
Comparing dwell time, pursuits and gaze gestures for gaze interaction on handheld mobile devices
Gaze is promising for hands-free interaction on mobile devices. However, it is not clear how
gaze interaction methods compare to each other in mobile settings. This paper presents the …
gaze interaction methods compare to each other in mobile settings. This paper presents the …
Rubikauth: Fast and secure authentication in virtual reality
There is a growing need for usable and secure authentication in virtual reality (VR).
Established concepts (eg, 2D graphical PINs) are vulnerable to observation attacks, and …
Established concepts (eg, 2D graphical PINs) are vulnerable to observation attacks, and …
Remote eye gaze tracking research: a comparative evaluation on past and recent progress
IS Shehu, Y Wang, AM Athuman, X Fu - Electronics, 2021 - mdpi.com
Several decades of eye related research has shown how valuable eye gaze data are for
applications that are essential to human daily life. Eye gaze data in a broad sense has been …
applications that are essential to human daily life. Eye gaze data in a broad sense has been …
Prototy** usable privacy and security systems: Insights from experts
Iterative design, implementation, and evaluation of prototype systems is a common
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
ShouldAR: Detecting Shoulder Surfing Attacks Using Multimodal Eye Tracking and Augmented Reality
Shoulder surfing attacks (SSAs) are a type of observation attack designed to illicitly gather
sensitive data from" over the shoulder" of victims. This attack can be directed at mobile …
sensitive data from" over the shoulder" of victims. This attack can be directed at mobile …
Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research
Given the difficulties of studying the shoulder surfing resistance of authentication systems in
a live setting, researchers often ask study participants to shoulder surf authentications by …
a live setting, researchers often ask study participants to shoulder surf authentications by …