메뉴 건너뛰기




Volumn 23, Issue 1, 2011, Pages 57-69

Usability evaluation of voiceprint authentication in automated telephone banking: Sentences versus digits

Author keywords

authentication; biometrics; dialogue design; usability; verification; Voiceprint

Indexed keywords

BANKING; BIOMETRICS; SALES; TELEPHONE SETS; USABILITY ENGINEERING; VERIFICATION;

EID: 78650267408     PISSN: 09535438     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.intcom.2010.10.001     Document Type: Article
Times cited : (21)

References (41)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • (Reprinted In: Cranor and Garfinkel (Eds.), 2005. Security and Usability. O'Reilly, pp. 639-649 (Chapter 32).
    • Adams, A., Sasse, M., 1999. Users are not the enemy. Communications of the ACM, 42(12), 41-46. (Reprinted In: Cranor and Garfinkel (Eds.), 2005. Security and Usability. O'Reilly, pp. 639-649 (Chapter 32).
    • (1999) Users Are Not the Enemy. Communications of the ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.2
  • 4
    • 34247143763 scopus 로고    scopus 로고
    • BioVision
    • BioVision, 2003., Roadmap for Biometrics in Europe to 2010. < http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.6354 > (accessed March 2010).
    • (2003) Roadmap for Biometrics in Europe to 2010
  • 5
    • 34547269590 scopus 로고    scopus 로고
    • Psychological acceptability revisited
    • Cranor Garfinkel O'Reilly
    • M. Bishop Psychological acceptability revisited Cranor Garfinkel Security and Usability 2005 O'Reilly 1 11 (Chapter 1)
    • (2005) Security and Usability , pp. 1-11
    • Bishop, M.1
  • 6
    • 70349581413 scopus 로고    scopus 로고
    • Usable biometrics
    • Cranor Garfinkel O'Reilly
    • L. Coventry Usable biometrics Cranor Garfinkel Security and Usability 2005 O'Reilly 175 198 (Chapter 10)
    • (2005) Security and Usability , pp. 175-198
    • Coventry, L.1
  • 9
    • 2942538616 scopus 로고    scopus 로고
    • Usability of dialogue design strategies for automated surname capture
    • N. Davidson, F.R. McInnes, and M.A. Jack Usability of dialogue design strategies for automated surname capture Speech Communication 43 2 2004 55 70
    • (2004) Speech Communication , vol.43 , Issue.2 , pp. 55-70
    • Davidson, N.1    McInnes, F.R.2    Jack, M.A.3
  • 17
    • 78449233273 scopus 로고    scopus 로고
    • Speaker Recognition from Encrypted VoIP Communications
    • 10.1016/j.diin.2009.10.001
    • L.A. Khan, M.S. Baig, and A.M. Youssef Speaker Recognition from Encrypted VoIP Communications Digital Investigation 2009 10.1016/j.diin.2009.10.001
    • (2009) Digital Investigation
    • Khan, L.A.1    Baig, M.S.2    Youssef, A.M.3
  • 18
  • 19
    • 85009205135 scopus 로고    scopus 로고
    • Assessment of spoken dialogue system usability - What are we really measuring?
    • Larsen, L.B., 2003. Assessment of spoken dialogue system usability - what are we really measuring?. In: Proc. EUROSPEECH'03, pp. 1945-1948.
    • (2003) Proc. EUROSPEECH'03 , pp. 1945-1948
    • Larsen, L.B.1
  • 20
    • 0001859044 scopus 로고
    • A technique for the measurement of attitudes
    • R. Likert A technique for the measurement of attitudes Archives of Psychology 1932 140
    • (1932) Archives of Psychology , pp. 140
    • Likert, R.1
  • 23
    • 78049527001 scopus 로고    scopus 로고
    • Experimental evaluation of the use of embodied conversational agents in eCommerce applications
    • Ruttkay, Z., Pelachaud, C. (Eds.) ISBN: 1-4020-2929-X.
    • Morton, H., McBreen, H.M., Jack, M.A., 2004. Experimental evaluation of the use of embodied conversational agents in eCommerce applications. In: Ruttkay, Z., Pelachaud, C. (Eds.), From Brows till Trust: Evaluating Embodied Conversational Agents, Kluwer, pp. 592-599. ISBN: 1-4020-2929-X.
    • (2004) From Brows Till Trust: Evaluating Embodied Conversational Agents, Kluwer , pp. 592-599
    • Morton, H.1    McBreen, H.M.2    Jack, M.A.3
  • 24
    • 77950864861 scopus 로고    scopus 로고
    • A real-time trained system for robust speaker verification using relative space of anchor models
    • A.S. Naini, M.M. Homayounpour, and A. Samani A real-time trained system for robust speaker verification using relative space of anchor models Computer Speech & Language 24 4 2010 545 561
    • (2010) Computer Speech & Language , vol.24 , Issue.4 , pp. 545-561
    • Naini, A.S.1    Homayounpour, M.M.2    Samani, A.3
  • 26
    • 32544452404 scopus 로고    scopus 로고
    • Human authentication featuring signatures and tokenised random numbers
    • DOI 10.1016/j.neucom.2005.08.003, PII S0925231205002377
    • L. Nanni, and A. Lumini Human authentication featuring signatures and tokenised random numbers Neurocomputing 69 7-9 2006 858 861 (March) (Pubitemid 43230391)
    • (2006) Neurocomputing , vol.69 , pp. 858-861
    • Nanni, L.1    Lumini, A.2
  • 27
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • DOI 10.1109/JPROC.2003.819611, Electronic Textiles: A Platform for Pervasive Computing
    • L. O'Gorman Comparing passwords, tokens and biometrics for authentication Proceedings of the IEEE 91 12 2003 2021 2040 (Pubitemid 40890781)
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • O'Gorman, L.1
  • 31
    • 79955462845 scopus 로고    scopus 로고
    • Usability and trust in information systems
    • Robin Mansell, Brian S. Collins (Eds.) ISBN: 1 84542 177 9
    • Sasse, M.A., 2004. Usability and trust in information systems. In: Robin Mansell, Brian S. Collins (Eds.), Trust and Crime in Information Societies, Edward Elgar, pp. 319-348. ISBN: 1 84542 177 9.
    • (2004) Trust and Crime in Information Societies, Edward Elgar , pp. 319-348
    • Sasse, M.A.1
  • 32
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • DOI 10.1023/A:1011902718709
    • M.A. Sasse, S. Brostoff, and D. Weirich Transforming the 'weakest link': a human-computer interaction approach to usable and effective security BT Technology Journal 19 3 2001 122 131 (Pubitemid 32903117)
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 33
    • 56349115879 scopus 로고    scopus 로고
    • Handwriting verification-comparison of a multi-algorithmic and a multi-semantic approach
    • T. Scheidat, C. Vielhauer, and J. Dittman Handwriting verification-comparison of a multi-algorithmic and a multi-semantic approach Image and Vision Computing 3 2009 269 278 (February)
    • (2009) Image and Vision Computing 3 , pp. 269-278
    • Scheidat, T.1    Vielhauer, C.2    Dittman, J.3
  • 34
    • 13944264031 scopus 로고    scopus 로고
    • Effective error recovery strategies for multimodal form-filling applications
    • DOI 10.1016/j.specom.2004.11.007, PII S016763930400144X
    • J. Sturm, and L. Boves Effective error recovery strategies for multimodal form-filling applications Speech Communication 45 3 2005 289 303 (Pubitemid 40266145)
    • (2005) Speech Communication , vol.45 , pp. 289-303
    • Sturm, J.1    Boves, L.2
  • 35
    • 77951253951 scopus 로고    scopus 로고
    • Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise
    • B. Tan, and S. Schuckers Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise Pattern Recognition 43 8 2010 2845 2857
    • (2010) Pattern Recognition , vol.43 , Issue.8 , pp. 2845-2857
    • Tan, B.1    Schuckers, S.2
  • 36
    • 33748916060 scopus 로고    scopus 로고
    • Usability evaluation of multi-modal biometric verification systems
    • DOI 10.1016/j.intcom.2006.01.004, PII S0953543806000348
    • D.T. Toledano, R. Fernández Pozo, A. Hernández Trapote, and L. Hernández Gómez Usability evaluation of multi-modal biometric verification systems Interacting with Computers 18 5 2006 1101 1122 (September) (Pubitemid 44428163)
    • (2006) Interacting with Computers , vol.18 , Issue.5 , pp. 1101-1122
    • Toledano, D.T.1    Fernandez Pozo, R.2    Hernandez Trapote, A.3    Hernandez Gomez, L.4
  • 38
    • 57849096551 scopus 로고    scopus 로고
    • User perceptions of security, convenience and usability for eBanking authentication tokens
    • C.S. Weir, G. Douglas, M. Carruthers, and M.A. Jack User perceptions of security, convenience and usability for eBanking authentication tokens Journal of Computers and Security 28 1 2009 47 62 February
    • (2009) Journal of Computers and Security , vol.28 , Issue.1 , pp. 47-62
    • Weir, C.S.1    Douglas, G.2    Carruthers, M.3    Jack, M.A.4
  • 40
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical results
    • DOI 10.1109/MSP.2004.81
    • J. Yan, A. Blackwell, R. Anderson, and A. Grant Password memorability and security: empirical results IEEE Security and Privacy 2 5 2004 25 31 (Pubitemid 40168623)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Alan, B.2    Anderson, R.3    Grant, A.4
  • 41
    • 54149086973 scopus 로고    scopus 로고
    • Unsupervised intra-speaker variability compensation based on Gestalt and model adaptation in speaker verification with telephone speech
    • N. Yoma, C. Garretón, C. Molina, and F. Huenupán Unsupervised intra-speaker variability compensation based on Gestalt and model adaptation in speaker verification with telephone speech Speech Communication 50 11-12 2008 953 964 (November-December)
    • (2008) Speech Communication , vol.50 , Issue.1112 , pp. 953-964
    • Yoma, N.1    Garretón, C.2    Molina, C.3    Huenupán, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.