Human-computer interaction: An empirical research perspective

IS MacKenzie - 2024 - books.google.com
Human-Computer Interaction: An Empirical Research Perspective is the definitive guide to
empirical research in HCI. The book begins with foundational topics including an historical …

Authentication mechanisms and classification: a literature survey

I Chenchev, A Aleksieva-Petrova, M Petrov - … Computing: Proceedings of …, 2021 - Springer
The Security must be considered from the need of two nodes to communicate with each
other, through the moment of confirmed authentication to the secured establishment. It is an …

Improving password memorability, while not inconveniencing the user

N Woods, M Siponen - International Journal of Human-Computer Studies, 2019 - Elsevier
Passwords are the most frequently used authentication mechanism. However, due to
increased password numbers, there has been an increase in insecure password behaviors …

Authentication melee: A usability analysis of seven web authentication systems

S Ruoti, B Roberts, K Seamons - … of the 24th international conference on …, 2015 - dl.acm.org
Passwords continue to dominate the authentication landscape in spite of numerous
proposals to replace them. Even though usability is a key factor in replacing passwords, very …

Too many passwords? How understanding our memory can increase password memorability

N Woods, M Siponen - International Journal of Human-Computer Studies, 2018 - Elsevier
Passwords are the most common authentication mechanism, that are only increasing with
time. Previous research suggests that users cannot remember multiple passwords …

Camera based two factor authentication through mobile and wearable devices

M Azimpourkivi, U Topkara, B Carbunar - Proceedings of the ACM on …, 2017 - dl.acm.org
We introduce Pixie, a novel, camera based two factor authentication solution for mobile and
wearable devices. A quick and familiar user action of snap** a photo is sufficient for Pixie …

Enhancing the user authentication process with colour memory cues

N Woods, J Silvennoinen - Behaviour & Information Technology, 2023 - Taylor & Francis
The authentication process is the first line of defence against potential impostors, and
therefore is an important concern when protecting personal and organisational data …

A secure mobile authentication alternative to biometrics

M Azimpourkivi, U Topkara, B Carbunar - Proceedings of the 33rd …, 2017 - dl.acm.org
Biometrics are widely used for authentication in consumer devices and business settings as
they provide sufficiently strong security instant verification and convenience for users …

Analyzing the use of quick response codes in the wild

A Lerner, A Saxena, K Ouimet, B Turley… - Proceedings of the 13th …, 2015 - dl.acm.org
One-and two-dimensional barcodes, including Quick Response (QR) codes, have become a
convenient way to communicate small amounts of information from physical objects to …

[BOOK][B] Human-centred web adaptation and personalization

P Germanakos, M Belk - 2016 - Springer
The rapid evolution of heterogeneous and ubiquitous technologies in recent years, along
with the growing demand for automation of services and content delivery, generated a …