A Gesture-based Authentication Scheme for Untrusted Public Terminals. Patel, S., N., Pierce, J., S., & Abowd, G., D. In Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology, of UIST '04, pages 157-160, 2004. ACM.
A Gesture-based Authentication Scheme for Untrusted Public Terminals [link]Website  abstract   bibtex   
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This opportunistic annexing will require authentication. We present a sensor-based authentication mechanism for mobile devices that relies on physical possession instead of knowledge to setup the initial connection to a public terminal. Our solution provides a simple mechanism for shaking a device to authenticate with the public infrastructure, making few assumptions about the surrounding infrastructure while also maintaining a reasonable level of security.
@inProceedings{
 title = {A Gesture-based Authentication Scheme for Untrusted Public Terminals},
 type = {inProceedings},
 year = {2004},
 identifiers = {[object Object]},
 keywords = {gestures,interaction,mobile,phone,sensors,with},
 pages = {157-160},
 websites = {http://doi.acm.org/10.1145/1029632.1029658},
 publisher = {ACM},
 city = {New York, NY, USA},
 series = {UIST '04},
 id = {ec2be64d-f231-3717-96ec-db9782880940},
 created = {2018-07-12T21:31:32.937Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:31:32.937Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {Patel:Gesture:2004},
 source_type = {inproceedings},
 private_publication = {false},
 abstract = {Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This opportunistic annexing will require authentication. We present a sensor-based authentication mechanism for mobile devices that relies on physical possession instead of knowledge to setup the initial connection to a public terminal. Our solution provides a simple mechanism for shaking a device to authenticate with the public infrastructure, making few assumptions about the surrounding infrastructure while also maintaining a reasonable level of security.},
 bibtype = {inProceedings},
 author = {Patel, Shwetak N and Pierce, Jeffrey S and Abowd, Gregory D},
 booktitle = {Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology}
}

Downloads: 0