Communications of the ACM
Authentication: from passwords to public keys
Authentication: from passwords to public keys
Designing the User Interface: Strategies for Effective Human-Computer Interaction
Designing the User Interface: Strategies for Effective Human-Computer Interaction
Lessons learned from the deployment of a smartphone-based access-control system
Proceedings of the 3rd symposium on Usable privacy and security
A fuzzy approach to multimodal biometric continuous authentication
Fuzzy Optimization and Decision Making
Interacting with Computers
Towards inclusive identity management
Identity in the Information Society
Towards information technology security for universal access
UAHCI'11 Proceedings of the 6th international conference on Universal access in human-computer interaction: design for all and eInclusion - Volume Part I
On the need for different security methods on mobile phones
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
A field study of user behavior and perceptions in smartcard authentication
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV
Secure, usable biometric authentication systems
UAHCI'13 Proceedings of the 7th international conference on Universal Access in Human-Computer Interaction: design methods, tools, and interaction techniques for eInclusion - Volume Part I
Hi-index | 0.02 |
The usability of security systems has become a major issue in research on the efficiency and user acceptance of security systems. The authentication process is essential for controlling the access to various resources and facilities. The design of usable yet secure user authentication methods raises crucial questions concerning how to solve conflicts between security and usability goals.