Communications of the ACM
Guest Editors' Introduction: Secure or Usable?
IEEE Security and Privacy
Security and usability: the case of the user authentication methods
IHM '06 Proceedings of the 18th International Conferenceof the Association Francophone d'Interaction Homme-Machine
Security in Computing (4th Edition)
Security in Computing (4th Edition)
Design principles and patterns for computer systems that are simultaneously secure and usable
Design principles and patterns for computer systems that are simultaneously secure and usable
Security Policies and Procedures: Principles and Practices (Prentice Hall Security Series)
Security Policies and Procedures: Principles and Practices (Prentice Hall Security Series)
Usability evaluation of multi-modal biometric verification systems
Interacting with Computers
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
AI & Society - Special Issue: Enculturating Human-Computer Interaction, Guest Editors: M. Rehm, Y. Nakano, E. André, T. Nishida
The Universal Access Handbook
Cyber risks to secure and private universal access
UAHCI'11 Proceedings of the 6th international conference on Universal access in human-computer interaction: design for all and eInclusion - Volume Part I
Towards information technology security for universal access
UAHCI'11 Proceedings of the 6th international conference on Universal access in human-computer interaction: design for all and eInclusion - Volume Part I
Introduction to Biometrics
Hi-index | 0.00 |
Biometrics are physiological features that allow individuals to be identified. Popular biometrics include fingerprints, faces, and irises. A common use of biometric systems is to authenticate users desiring access to a system or resource. Universal Access can be promoted with biometrics. Biometrics provide a secure way to access information technology, although the use of biometrics presents challenges and opportunities unique to other authentication methods (such as passwords and tokens). Biometric systems are also vulnerable to poor usability. Such systems must be engineered with wide user accessibility and acceptability in mind, but also need to provide robust security. This paper considers the application of biometrics in Universal Access systems with regards to usability and security.