Comparison of three one-question, post-task usability questionnaires
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
TapSongs: tapping rhythm-based passwords on a single binary sensor
Proceedings of the 22nd annual ACM symposium on User interface software and technology
Protractor: a fast and accurate gesture recognizer
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
On the need for different security methods on mobile phones
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
Counting clicks and beeps: Exploring numerosity based haptic and audio PIN entry
Interacting with Computers
PassChords: secure multi-touch authentication for blind people
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
Hi-index | 0.00 |
Current smartphone authentication methods are known to be susceptible to even rudimentary attacks based on observation. In this paper, we propose an approach to authentication based on rich tapping patterns that addresses this problem. We present a novel tapping detection technique, using a single example as a template. We also report on two user studies (N = 30 and N = 19) where tapping authentication is compared to the leading alternatives, both in an "out in the open" and in an "under the table" condition. Results indicate that the tapping method approximates current standards of security and usability, but also affords inconspicuous authentication, thus allowing the user to self-protect in social settings.