The official PGP user's guide
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
The NIST speaker recognition evaluation - overview methodology, systems, results, perspective
Speech Communication - Speaker recognition and its commercial and forensic applications
A Practical Guide to Biometric Security Technology
IT Professional
Person Identification Using Multiple Cues
IEEE Transactions on Pattern Analysis and Machine Intelligence
Biometric authentication - security and usability
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 - Volume 8
International Journal of Human-Computer Studies
Proceedings of the 17th annual ACM symposium on User interface software and technology
Secrets and Lies
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Fingers, veins and the grey pound: accessibility of biometric technology
Proceedings of the 14th European conference on Cognitive ergonomics: invent! explore!
Nineteen Urgent Research Topics in Biometrics and Identity Management
Biometrics and Identity Management
mFerio: the design and evaluation of a peer-to-peer mobile payment system
Proceedings of the 7th international conference on Mobile systems, applications, and services
Help From Strangers --Media Arts In Ambient Intelligence Research
Proceedings of the 2007 conference on Advances in Ambient Intelligence
Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part II
Interacting with Computers
Improving e-banking security with biometrics: modelling user attitudes and acceptance
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Improving identity prediction in signature-based unimodal systems using soft biometrics
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
Interacting with Computers
Security in context: investigating the impact of context on attitudes towards biometric technology
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Biometric authentication on a mobile device: a study of user effort, error and task disruption
Proceedings of the 28th Annual Computer Security Applications Conference
Secure, usable biometric authentication systems
UAHCI'13 Proceedings of the 7th international conference on Universal Access in Human-Computer Interaction: design methods, tools, and interaction techniques for eInclusion - Volume Part I
Hi-index | 0.00 |
As a result of the evolution in the field of biometrics, a new breed of techniques and methods for user identity recognition and verification has appeared based on the recognition and verification of several biometric features considered unique to each individual. Signature and voice characteristics, facial features, and iris and fingerprint patterns have all been used to identify a person or just to verify that the person is who he/she claims to be. Although still relatively new, these new technologies have already reached a level of development that allows its commercialization. However, there is a lack of studies devoted to the evaluation of these technologies from a user-centered perspective. This paper is intended to promote user-centered design and evaluation of biometric technologies. Towards this end, we have developed a platform to perform empirical evaluations of commercial biometric identity verification systems, including fingerprint, voice and signature verification. In this article, we present an initial empirical study in which we evaluate, compare and try to get insights into the factors that are crucial for the usability of these systems.