Using handhelds and PCs together
Communications of the ACM
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Wireless User Interface Components for Personal Area Networks
IEEE Pervasive Computing
Photographic Authentication through Untrusted Terminals
IEEE Pervasive Computing
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
The Personal Server: Changing the Way We Think about Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Synchronous gestures for multiple persons and computers
Proceedings of the 16th annual ACM symposium on User interface software and technology
The Smart Phone: A Ubiquitous Input Device
IEEE Pervasive Computing
BlueTable: connecting wireless mobile devices on interactive surfaces using vision-based handshaking
GI '07 Proceedings of Graphics Interface 2007
Proceedings of the 15th ACM conference on Computer and communications security
Vibrapass: secure authentication based on shared lies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Unravelling seams: improving mobile gesture recognition with visual feedback techniques
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Guidelines for designing graphical authentication mechanism interfaces
International Journal of Information and Computer Security
Look into my eyes!: can you guess my password?
Proceedings of the 5th Symposium on Usable Privacy and Security
User evaluation of lightweight user authentication with a single tri-axis accelerometer
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
Exploring the Use of Discrete Gestures for Authentication
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part II
uWave: Accelerometer-based personalized gesture recognition and its applications
Pervasive and Mobile Computing
Whack gestures: inexact and inattentive interaction with mobile devices
Proceedings of the fourth international conference on Tangible, embedded, and embodied interaction
The secure haptic keypad: a tactile password system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The Martini Synch: joint fuzzy hashing via error correction
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Gesture interaction in cooperation scenarios
CRIWG'09 Proceedings of the 15th international conference on Groupware: design, implementation, and use
GesturePIN: using discrete gestures for associating mobile devices
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Sensing foot gestures from the pocket
UIST '10 Proceedings of the 23nd annual ACM symposium on User interface software and technology
ShakeOnit: an exploration into leveraging social rituals for information access
Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction
A novel taxonomy for gestural interaction techniques based on accelerometers
Proceedings of the 16th international conference on Intelligent user interfaces
How users associate wireless devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 2011 workshop on New security paradigms workshop
Gesture signature for ambient intelligence applications: a feasibility study
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Usability classification for spontaneous device association
Personal and Ubiquitous Computing
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
SessionJuggler: secure web login from an untrusted terminal using session hijacking
Proceedings of the 21st international conference on World Wide Web
Leveraging motor learning for a tangible password system
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Arm swing identification method with template update for long term stability
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
On designing interactivity awareness for ambient displays
Multimedia Tools and Applications
Visual authentication: a secure single step authentication for user authorization
Proceedings of the 12th International Conference on Mobile and Ubiquitous Multimedia
Runtime adaptive multi-factor authentication for mobile devices
IBM Journal of Research and Development
Hi-index | 0.00 |
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This opportunistic annexing will require authentication. We present a sensor-based authentication mechanism for mobile devices that relies on physical possession instead of knowledge to setup the initial connection to a public terminal. Our solution provides a simple mechanism for shaking a device to authenticate with the public infrastructure, making few assumptions about the surrounding infrastructure while also maintaining a reasonable level of security.