Communications of the ACM
Interaction in 4-second bursts: the fragmented nature of attentional resources in mobile HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Security Management for Mobile Devices by Face Recognition
MDM '06 Proceedings of the 7th International Conference on Mobile Data Management
Usability evaluation of multi-modal biometric verification systems
Interacting with Computers
A large-scale study of web password habits
Proceedings of the 16th international conference on World Wide Web
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Towards understanding user perceptions of authentication technologies
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Improving e-banking security with biometrics: modelling user attitudes and acceptance
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
A closer look at recognition-based graphical passwords on mobile devices
Proceedings of the Sixth Symposium on Usable Privacy and Security
Experiments with Simple Iris Recognition for Mobile Phones
ITNG '10 Proceedings of the 2010 Seventh International Conference on Information Technology: New Generations
Implicit authentication for mobile devices
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Interacting with Computers
Smart phone use by non-mobile business users
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
Securing electronic medical records using biometric authentication
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Hi-index | 0.00 |
We examine three biometric authentication modalities -- voice, face and gesture -- as well as password entry, on a mobile device, to explore the relative demands on user time, effort, error and task disruption. Our laboratory study provided observations of user actions, strategies, and reactions to the authentication methods. Face and voice biometrics conditions were faster than password entry. Speaking a PIN was the fastest for biometric sample entry, but short-term memory recall was better in the face verification condition. None of the authentication conditions were considered very usable. In conditions that combined two biometric entry methods, the time to acquire the biometric samples was shorter than if acquired separately but they were very unpopular and had high memory task error rates. These quantitative results demonstrate cognitive and motor differences between biometric authentication modalities, and inform policy decisions in selecting authentication methods.