Under the table: Tap authentication for smartphones

15Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

Current smartphone authentication methods are known to be susceptible to even rudimentary attacks based on observation. In this paper, we propose an approach to authentication based on rich tapping patterns that addresses this problem. We present a novel tapping detection technique, using a single example as a template. We also report on two user studies (N = 30 and N = 19) where tapping authentication is compared to the leading alternatives, both in an "out in the open" and in an "under the table" condition. Results indicate that the tapping method approximates current standards of security and usability, but also affords inconspicuous authentication, thus allowing the user to self-protect in social settings.

Cite

CITATION STYLE

APA

Marques, D., Guerreiro, T., Duarte, L., & Carrico, L. (2013). Under the table: Tap authentication for smartphones. In HCI 2013 - 27th International British Computer Society Human Computer Interaction Conference: The Internet of Things. British Computer Society. https://doi.org/10.14236/ewic/hci2013.42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free