skip to main content
chapter

Secure Gestures—Case Study 4

Published: 23 February 2021 Publication History
First page of PDF

References

[1]
I. Aslan, A. Uhl, A. Meschtscherjakov, and M. Tscheligi. 2014. Mid-air authentication gestures: An exploration of authentication based on palm and finger motions. In Proceedings of the 16th International Conference on Multimodal Interaction, ICMI’14. ACM, New York, NY, 311–318. ISBN: 978-1-4503-2885-2.
[2]
M. T. I. Aumi and S. Kratz. 2014. AirAuth: Evaluating in-air hand gestures for authentication. In Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices & Services, MobileHCI’14. ACM, New York, NY, 309–318. ISBN: 978-1-4503-3004-6.
[3]
G. D. Clark and J. Lindqvist. Jan. 2015. Engineering gesture-based authentication systems. Pervas. Comput. IEEE 14, 1, 18–25. ISSN: 1536-1268.
[4]
G. D. Clark, J. Lindqvist, and A. Oulasvirta. 2017. Composition policies for gesture passwords: User choice, security, usability and memorability. In 2017 IEEE Conference on Communications and Network Security (CNS). IEEE.
[5]
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. 1999. The design and analysis of graphical passwords. In Proceedings of the 8th Conference on USENIX Security Symposium – Volume 8, SSYM’99. USENIX Association, Berkeley, CA, 1–1.
[6]
Y. Li. Nov. 9. 2018. Protractor Pseudo Code. http://yangl.org/protractor/protractor.pdf.
[7]
C. Liu, G. D. Clark, and J. Lindqvist. 2017a. Where usability and security go hand-in-hand: Robust gesture-based authentication for mobile systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI’17. ACM, New York, NY.
[8]
C. Liu, G. D. Clark, and J. Lindqvist. Mar. 2017b. Guessing attacks on user-generated gesture passwords. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3. ISSN: 2474-9567.
[9]
A. D. Luca and J. Lindqvist. May. 2015. Is secure and usable smartphone authentication asking too much? Computer 48, 5, 64–68. ISSN: 0018-9162.
[10]
M. Sherman, G. Clark, Y. Yang, S. Sugrim, A. Modig, J. Lindqvist, A. Oulasvirta, and T. Roos. 2014. User-generated free-form gestures for authentication: Security and memorability. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys’14. ACM, New York, NY, 176–189. ISBN: 978-1-4503-2793-0.
[11]
S. Sugrim, C. Liu, and J. Lindqvist. Sep. 2019a. Recruit until it fails: Exploring performance limits for identification systems. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3.
[12]
S. Sugrim, C. Liu, M. McLean, and J. Lindqvist. 2019b. Robust performance metrics for authentication systems. In The Network and Distributed System Security Symposium 2019, NDSS’19.
[13]
J. Tian, C. Qu, W. Xu, and S. Wang. 2013. KinWrite: Handwriting-based authentication using Kinect. In 20th Annual Network & Distributed System Security Symposium, NDSS’13. http://www.internetsociety.org/sites/default/files/10_2_0.pdf.
[14]
S. Uellenbeck, M. Dürmuth, C. Wolf, and T. Holz. 2013. Quantifying the security of graphical passwords: The case of android unlock patterns. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS’13. ACM, New York, NY, 161–172. ISBN: 978-1-4503-2477-9.
[15]
J. O. Wobbrock, A. D. Wilson, and Y. Li. 2007. Gestures without libraries, toolkits or training: A $1 recognizer for user interface prototypes. In Proceedings of the 20th Annual ACM Symposium on User Interface Software and Technology, UIST’07. ACM, 159–168. ISBN: 978-1-59593-679-0.
[16]
J. Wu, J. Konrad, and P. Ishwar. May. 2013. Dynamic time warping for gesture-based user identification and authentication with Kinect. In 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP’13, 2371–2375.
[17]
J. Yang, Y. Li, and M. Xie. Mar. 2015. MotionAuth: Motion-based authentication for wrist worn smart devices. In 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops’15, 550–555.
[18]
Y. Yang, G. D. Clark, J. Lindqvist, and A. Oulasvirta. 2016. Free-form gesture authentication in the wild. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI’16. ACM, New York, NY, 3722–3735. ISBN: 978-1-4503-3362-7.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Books
Intelligent Computing for Interactive System Design: Statistics, Digital Signal Processing, and Machine Learning in Practice
February 2021
474 pages
ISBN:9781450390293
DOI:10.1145/3447404

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 February 2021

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Chapter

Appears in

ACM Books

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 3
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 22 Jan 2025

Other Metrics

Citations

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media