CursorCamouflage: multiple dummy cursors as a defense against shoulder surfing

  • Authors:
  • Keita Watanabe;Fumito Higuchi;Masahiko Inami;Takeo Igarashi

  • Affiliations:
  • JST ERATO Igarashi Design Interface Project;JST ERATO Igarashi Design Interface Project;JST ERATO Igarashi Design Interface Project;JST ERATO Igarashi Design Interface Project

  • Venue:
  • SIGGRAPH Asia 2012 Emerging Technologies
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

More and more services and information are being stored on the cloud. Since anybody can access an Internet terminal, it is critical to provide appropriate security mechanisms. One popular approach is to strengthen the protocol and encryption algorithm, which is now being actively investigated in the security field. Another potentially effective approach is to enhance the user interface for security systems. Since security is ultimately a human-computer interaction problem, we believe that there are many interesting opportunities related to the latter approach.