15 research outputs found

    Conceivable security risks and authentication techniques for smart devices

    Get PDF
    With the rapidly escalating use of smart devices and fraudulent transaction of usersā€™ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques

    Simple Nudges for Better Password Creation

    Get PDF
    Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords

    New reaction of 1,1-bis(propylthio)ethane with benzoyl peroxide

    No full text

    Workshop on inconspicuous interaction

    No full text
    Growing usage of interactive systems in the public space has highlighted the prevalence of conflicts between desired functionality and maintenance of privacy / social comfort. This has inspired researchers and practitioners, in communities concerned with usable security, wearable and mobile interfaces, natural user interfaces, accessibility and social interaction, to employ inconspicuous interaction styles. This workshop will bring these communities together to produce forward-looking insights that can shape the way users interact with tomorrow's computers, in interactive systems that account for the social nomadic contexts where they are bound to be used
    corecore