Toolglass and magic lenses: the see-through interface
CHI '94 Conference Companion on Human Factors in Computing Systems
Single display privacyware: augmenting public displays with private information
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Photographic Authentication through Untrusted Terminals
IEEE Pervasive Computing
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
Multi-finger and whole hand gestural interaction techniques for multi-user tabletop displays
Proceedings of the 16th annual ACM symposium on User interface software and technology
Proceedings of the 17th annual ACM symposium on User interface software and technology
A PIN-entry method resilient against shoulder surfing
Proceedings of the 11th ACM conference on Computer and communications security
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Spy-resistant keyboard: more secure password entry on public touch screen displays
OZCHI '05 Proceedings of the 17th Australia conference on Computer-Human Interaction: Citizens Online: Considerations for Today and the Future
Design and evaluation of a shoulder-surfing resistant graphical password scheme
Proceedings of the working conference on Advanced visual interfaces
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Undercover: authentication usable in front of prying eyes
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Public and private workspaces on tabletop displays
AUIC '08 Proceedings of the ninth conference on Australasian user interface - Volume 76
Securing passfaces for description
Proceedings of the 4th symposium on Usable privacy and security
A privacy-respectful input method for public terminals
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
Vibrapass: secure authentication based on shared lies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A closer look at recognition-based graphical passwords on mobile devices
Proceedings of the Sixth Symposium on Usable Privacy and Security
Towards understanding ATM security: a field study of real world ATM use
Proceedings of the Sixth Symposium on Usable Privacy and Security
HandsDown: hand-contour-based user identification for interactive surfaces
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
The phone lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices
Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction
pPen: enabling authenticated pen and touch interaction on tabletop surfaces
ACM International Conference on Interactive Tabletops and Surfaces
TaPS Widgets: tangible control over private spaces on interactive tabletops
CHI '11 Extended Abstracts on Human Factors in Computing Systems
TaPS widgets: interacting with tangible private spaces
Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces
Biometric-rich gestures: a novel approach to authentication on multi-touch devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A cross-device interaction style for mobiles and surfaces
Proceedings of the Designing Interactive Systems Conference
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
Password entry usability and shoulder surfing susceptibility on different smartphone platforms
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
MIBA: multitouch image-based authentication on smartphones
CHI '13 Extended Abstracts on Human Factors in Computing Systems
User authentication in a multi-touch surface: a chord password system
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Designing leakage-resilient password entry on touchscreen mobile devices
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
MTi: A method for user identification for multitouch displays
International Journal of Human-Computer Studies
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Exploring the design space of graphical passwords on smartphones
Proceedings of the Ninth Symposium on Usable Privacy and Security
Extended PIN Authentication Scheme Allowing Multi-Touch Key Input
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
An approach for designing and evaluating a plug-in vision-based tabletop touch identification system
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
Personal and Ubiquitous Computing
Hi-index | 0.01 |
The introduction of tabletop interfaces has given rise to the need for the development of secure and usable authentication techniques that are appropriate for the co-located collaborative settings for which they have been designed. Most commonly, user authentication is based on something you know, but this is a particular problem for tabletop interfaces, as they are particularly vulnerable to shoulder surfing given their remit to foster co-located collaboration. In other words, tabletop users would typically authenticate in full view of a number of observers. In this paper, we introduce and evaluate a number of novel tabletop authentication schemes that exploit the features of multi-touch interaction in order to inhibit shoulder surfing. In our pilot work with users, and in our formal user-evaluation, one authentication scheme - Pressure-Grid - stood out, significantly enhancing shoulder surfing resistance when participants used it to enter both PINs and graphical passwords.