A Gesture-based Authentication Scheme for Untrusted Public Terminals. Patel, S., N., Pierce, J., S., & Abowd, G., D. In Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology, of UIST '04, pages 157-160, 2004. ACM.
Website abstract bibtex Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This opportunistic annexing will require authentication. We present a sensor-based authentication mechanism for mobile devices that relies on physical possession instead of knowledge to setup the initial connection to a public terminal. Our solution provides a simple mechanism for shaking a device to authenticate with the public infrastructure, making few assumptions about the surrounding infrastructure while also maintaining a reasonable level of security.
@inProceedings{
title = {A Gesture-based Authentication Scheme for Untrusted Public Terminals},
type = {inProceedings},
year = {2004},
identifiers = {[object Object]},
keywords = {gestures,interaction,mobile,phone,sensors,with},
pages = {157-160},
websites = {http://doi.acm.org/10.1145/1029632.1029658},
publisher = {ACM},
city = {New York, NY, USA},
series = {UIST '04},
id = {ec2be64d-f231-3717-96ec-db9782880940},
created = {2018-07-12T21:31:32.937Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:32.937Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {Patel:Gesture:2004},
source_type = {inproceedings},
private_publication = {false},
abstract = {Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This opportunistic annexing will require authentication. We present a sensor-based authentication mechanism for mobile devices that relies on physical possession instead of knowledge to setup the initial connection to a public terminal. Our solution provides a simple mechanism for shaking a device to authenticate with the public infrastructure, making few assumptions about the surrounding infrastructure while also maintaining a reasonable level of security.},
bibtype = {inProceedings},
author = {Patel, Shwetak N and Pierce, Jeffrey S and Abowd, Gregory D},
booktitle = {Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology}
}
Downloads: 0
{"_id":"aALM6QAAFMnKafuBT","bibbaseid":"patel-pierce-abowd-agesturebasedauthenticationschemeforuntrustedpublicterminals-2004","downloads":0,"creationDate":"2019-02-15T15:14:59.336Z","title":"A Gesture-based Authentication Scheme for Untrusted Public Terminals","author_short":["Patel, S., N.","Pierce, J., S.","Abowd, G., D."],"year":2004,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"A Gesture-based Authentication Scheme for Untrusted Public Terminals","type":"inProceedings","year":"2004","identifiers":"[object Object]","keywords":"gestures,interaction,mobile,phone,sensors,with","pages":"157-160","websites":"http://doi.acm.org/10.1145/1029632.1029658","publisher":"ACM","city":"New York, NY, USA","series":"UIST '04","id":"ec2be64d-f231-3717-96ec-db9782880940","created":"2018-07-12T21:31:32.937Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:32.937Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"Patel:Gesture:2004","source_type":"inproceedings","private_publication":false,"abstract":"Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This opportunistic annexing will require authentication. We present a sensor-based authentication mechanism for mobile devices that relies on physical possession instead of knowledge to setup the initial connection to a public terminal. Our solution provides a simple mechanism for shaking a device to authenticate with the public infrastructure, making few assumptions about the surrounding infrastructure while also maintaining a reasonable level of security.","bibtype":"inProceedings","author":"Patel, Shwetak N and Pierce, Jeffrey S and Abowd, Gregory D","booktitle":"Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology","bibtex":"@inProceedings{\n title = {A Gesture-based Authentication Scheme for Untrusted Public Terminals},\n type = {inProceedings},\n year = {2004},\n identifiers = {[object Object]},\n keywords = {gestures,interaction,mobile,phone,sensors,with},\n pages = {157-160},\n websites = {http://doi.acm.org/10.1145/1029632.1029658},\n publisher = {ACM},\n city = {New York, NY, USA},\n series = {UIST '04},\n id = {ec2be64d-f231-3717-96ec-db9782880940},\n created = {2018-07-12T21:31:32.937Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:32.937Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {Patel:Gesture:2004},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This opportunistic annexing will require authentication. We present a sensor-based authentication mechanism for mobile devices that relies on physical possession instead of knowledge to setup the initial connection to a public terminal. Our solution provides a simple mechanism for shaking a device to authenticate with the public infrastructure, making few assumptions about the surrounding infrastructure while also maintaining a reasonable level of security.},\n bibtype = {inProceedings},\n author = {Patel, Shwetak N and Pierce, Jeffrey S and Abowd, Gregory D},\n booktitle = {Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology}\n}","author_short":["Patel, S., N.","Pierce, J., S.","Abowd, G., D."],"urls":{"Website":"http://doi.acm.org/10.1145/1029632.1029658"},"bibbaseid":"patel-pierce-abowd-agesturebasedauthenticationschemeforuntrustedpublicterminals-2004","role":"author","keyword":["gestures","interaction","mobile","phone","sensors","with"],"downloads":0},"search_terms":["gesture","based","authentication","scheme","untrusted","public","terminals","patel","pierce","abowd"],"keywords":["gestures","interaction","mobile","phone","sensors","with"],"authorIDs":[]}