Secure techniques and methods for authenticating visually impaired mobile phone users

@article{Haque2013SecureTA,
  title={Secure techniques and methods for authenticating visually impaired mobile phone users},
  author={Md Munirul Haque and Shams Zawoad and Ragib Hasan},
  journal={2013 IEEE International Conference on Technologies for Homeland Security (HST)},
  year={2013},
  pages={735-740}
}
A series of new types of frauds and threats have emerged with the increased popularity of smartphones. Studies show that smartphone users are three times more likely to become the victims of identity fraud. Though researchers have developed many well known methods for user authentication in smartphone, little has been done focusing on visually impaired mobile device users. Commonly used username-password based authentication is not suitable for such users as it is cumbersome and highly… CONTINUE READING
4 Citations
20 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 20 references

Accelerometer data

  • wavefrontlabs.com
  • http://wavefrontlabs.com/ Wavefront Labs…
  • 2013
2 Excerpts

Nearly half of american adults are smartphone owners

  • A. Smith
  • Online at http://pewinternet.org/Reports/2012…
  • 2012
1 Excerpt

Rise in identity fraud tied to smartphone use

  • M. Lipka
  • Online at http://www.reuters.com/article/2012/02…
  • 2012
2 Excerpts

The honey-stick project

  • streetwise-security-zone
  • Online at http://www.streetwise-security-zone.com…
  • 2012
1 Excerpt

Similar Papers

Loading similar papers…