Human-computer interaction: An empirical research perspective
IS MacKenzie - 2024 - books.google.com
Human-Computer Interaction: An Empirical Research Perspective is the definitive guide to
empirical research in HCI. The book begins with foundational topics including an historical …
empirical research in HCI. The book begins with foundational topics including an historical …
Authentication mechanisms and classification: a literature survey
The Security must be considered from the need of two nodes to communicate with each
other, through the moment of confirmed authentication to the secured establishment. It is an …
other, through the moment of confirmed authentication to the secured establishment. It is an …
Improving password memorability, while not inconveniencing the user
Passwords are the most frequently used authentication mechanism. However, due to
increased password numbers, there has been an increase in insecure password behaviors …
increased password numbers, there has been an increase in insecure password behaviors …
Authentication melee: A usability analysis of seven web authentication systems
Passwords continue to dominate the authentication landscape in spite of numerous
proposals to replace them. Even though usability is a key factor in replacing passwords, very …
proposals to replace them. Even though usability is a key factor in replacing passwords, very …
Too many passwords? How understanding our memory can increase password memorability
Passwords are the most common authentication mechanism, that are only increasing with
time. Previous research suggests that users cannot remember multiple passwords …
time. Previous research suggests that users cannot remember multiple passwords …
Camera based two factor authentication through mobile and wearable devices
We introduce Pixie, a novel, camera based two factor authentication solution for mobile and
wearable devices. A quick and familiar user action of snap** a photo is sufficient for Pixie …
wearable devices. A quick and familiar user action of snap** a photo is sufficient for Pixie …
Enhancing the user authentication process with colour memory cues
The authentication process is the first line of defence against potential impostors, and
therefore is an important concern when protecting personal and organisational data …
therefore is an important concern when protecting personal and organisational data …
A secure mobile authentication alternative to biometrics
Biometrics are widely used for authentication in consumer devices and business settings as
they provide sufficiently strong security instant verification and convenience for users …
they provide sufficiently strong security instant verification and convenience for users …
Analyzing the use of quick response codes in the wild
One-and two-dimensional barcodes, including Quick Response (QR) codes, have become a
convenient way to communicate small amounts of information from physical objects to …
convenient way to communicate small amounts of information from physical objects to …
[BOOK][B] Human-centred web adaptation and personalization
P Germanakos, M Belk - 2016 - Springer
The rapid evolution of heterogeneous and ubiquitous technologies in recent years, along
with the growing demand for automation of services and content delivery, generated a …
with the growing demand for automation of services and content delivery, generated a …