Behavioral authentication for security and safety

C Wang, H Tang, H Zhu, J Zheng… - Security and …, 2024 - sands.edpsciences.org
The issues of both system security and safety can be dissected integrally from the
perspective of behavioral appropriateness. That is, a system that is secure or safe can be …

Assessing preknowledge cheating via innovative measures: A multiple-group analysis of jointly modeling item responses, response times, and visual fixation counts

K Man, JR Harring - Educational and Psychological …, 2021 - journals.sagepub.com
Many approaches have been proposed to jointly analyze item responses and response
times to understand behavioral differences between normally and aberrantly behaved test …

Privacy-preserving biometric-driven data for student identity management: Challenges and approaches

C Fidas, M Belk, D Portugal, A Pitsillides - Adjunct Proceedings of the …, 2021 - dl.acm.org
Biometric technologies are being considered lately for student identity management in
Higher Education Institutions, as they provide several advantages over the traditional …

An eye gaze-driven metric for estimating the strength of graphical passwords based on image hotspots

A Constantinides, M Belk, C Fidas… - Proceedings of the 25th …, 2020 - dl.acm.org
In this paper, we propose an eye gaze-driven metric based on hotspot vs. non-hotspot
segments of images for unobtrusively estimating the strength of user-created graphical …

From hot-spots towards experience-spots: Leveraging on users' sociocultural experiences to enhance security in cued-recall graphical authentication

A Constantinides, C Fidas, M Belk, AM Pietron… - International Journal of …, 2021 - Elsevier
This paper suggests a novel cued-recall-based graphical authentication method, which
leverages on users' sociocultural experiences for improving the security and memorability of …

The serums tool-chain: ensuring security and privacy of medical data in smart patient-centric healthcare systems

V Janjic, JKF Bowles, AF Vermeulen… - … Conference on Big …, 2019 - ieeexplore.ieee.org
Future-generation healthcare systems will be highly distributed, combining centralised
hospital systems with decentralised home-, work-and environment-based monitoring and …

A cross-cultural perspective for personalizing picture passwords

A Constantinides, AM Pietron, M Belk, C Fidas… - Proceedings of the 28th …, 2020 - dl.acm.org
Picture passwords, which require users to draw selections on images as their secret
password, typically provide globalized solutions without taking into consideration that …

Design and development of a patient-centric user authentication system

A Constantinides, M Belk, C Fidas… - Adjunct Publication of the …, 2020 - dl.acm.org
Advancements in computer and communication technology enabled the rapid growth of e-
health services, which can nowadays provide various electronic methods (eg, obtaining …

“I Recall this Picture”: Understanding Picture Password Selections based on Users' Sociocultural Experiences

A Constantinides, C Fidas, M Belk… - IEEE/WIC/ACM …, 2019 - dl.acm.org
Graphical passwords leverage the picture superiority effect to enhance memorability, and
reflect today's haptic user interaction realms. Image content related to users' past …

Eye gaze and interaction differences of holistic versus analytic users in image-recognition human interaction proof schemes

P Leonidou, A Constantinides, M Belk, C Fidas… - … Conference on Human …, 2021 - Springer
Abstract Image-recognition Human Interaction Proof (HIP) schemes are widely used security
defense mechanisms that are utilized by service providers to determine whether a human …