Proceedings of the 18th International Conference on Mobile and Ubiquitous Multimedia 2019
DOI: 10.1145/3365610.3365628
|View full text |Cite
|
Sign up to set email alerts
|

Securing personal items in public space

Abstract: While we put great effort in protecting digital devices and data, there is a lack of research on usable techniques to secure personal items that we carry in public space. To better understand situations where ubiquitous technologies could help secure personal items, we conducted an online survey (N=101) in which we collected real-world stories from users reporting on personal items, either at risk of, or actually being lost, damaged or stolen. We found, for example, that the majority of cases occurred in (semi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…[39] Image Human bias in password choice 2010 Sun et al [258] Multi-touch Shoulder-surfing (video observation and disclosure of exact password) 2014 Yue et al [300] Touch Technical challenges of blind recognition of touched keys from video 2014 Huhta et al [128] Acceleration Attack on the ZEBRA system [177], discuss improvements 2015 Li et al [166] Acceleration Imitation of head movement 2016 Nguyen et al [203] Image recall Shoulder surfing 2016 Cha et al [47] Pattern Optimal conditions for smudge attacks, protection, mitigation strategies 2017 Zhang et al [301] Voice Dolphin attack: inaudible voice commands 2017 Kraus et al [151] Emoji recall Shoulder surfing 2017 Chen et al [48] Audio/Magnetom. Machine-based voice impersonation 2017 Miettinen et al [191] Audio Impersonation, Man-in-the-Middle 2018 Prange et al [216] various Threats and design flaws of smart home environments 2019 Prange et al [215] various Model of security incidents with personal items in public; survey and stories 2019 Shin et al [245] pattern Attacks on Android pattern lock systems 2020 Alqahtani et al [9] image Attacks on machine learning for image-based captcha 2020 Bhana et al [27] Various Usability and security comparison of authentication schemes 2020 Vyas et al [285] Various Attack prevention schemes for body area networks 2020…”
Section: Usably Secure User-to-device Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…[39] Image Human bias in password choice 2010 Sun et al [258] Multi-touch Shoulder-surfing (video observation and disclosure of exact password) 2014 Yue et al [300] Touch Technical challenges of blind recognition of touched keys from video 2014 Huhta et al [128] Acceleration Attack on the ZEBRA system [177], discuss improvements 2015 Li et al [166] Acceleration Imitation of head movement 2016 Nguyen et al [203] Image recall Shoulder surfing 2016 Cha et al [47] Pattern Optimal conditions for smudge attacks, protection, mitigation strategies 2017 Zhang et al [301] Voice Dolphin attack: inaudible voice commands 2017 Kraus et al [151] Emoji recall Shoulder surfing 2017 Chen et al [48] Audio/Magnetom. Machine-based voice impersonation 2017 Miettinen et al [191] Audio Impersonation, Man-in-the-Middle 2018 Prange et al [216] various Threats and design flaws of smart home environments 2019 Prange et al [215] various Model of security incidents with personal items in public; survey and stories 2019 Shin et al [245] pattern Attacks on Android pattern lock systems 2020 Alqahtani et al [9] image Attacks on machine learning for image-based captcha 2020 Bhana et al [27] Various Usability and security comparison of authentication schemes 2020 Vyas et al [285] Various Attack prevention schemes for body area networks 2020…”
Section: Usably Secure User-to-device Authenticationmentioning
confidence: 99%
“…15 www.realuser.com [150] Emoji recall Shoulder sur ng 2017 Chen et al [47] Audio/Magnetom. Machine-based voice impersonation 2017 Miettinen et al [190] Audio Impersonation, Man-in-the-Middle 2018 Prange et al [214] various Threats and design aws of smart home environments 2019 Prange et al [213] various Model of security incidents with personal items in public; survey and stories 2019 Shin et al [243] pattern Attacks on android pattern lock systems 2020 Alqahtani et al [9] image Attacks on machine learning for image-based capcha 2020 Bhana et al [26] Various Usability and security comparison of authentication schemes 2020 Vyas et al [283] Various Attack prevention schemes for body area networks 2020…”
Section: Image Image-based Authentication Has An Advantagementioning
confidence: 99%