메뉴 건너뛰기




Volumn , Issue , 2012, Pages 197-208

Distinguishing users with capacitive touch communication

Author keywords

Capacitive touch communication; Distinguishing users; Signetring; Touchscreen communication; User identification

Indexed keywords

COMMUNICATION METHOD; CONTROL APPLICATIONS; CONTROLLED EXPERIMENT; DATA RATES; DISTINGUISHING USERS; FUTURE DESIGNS; HUMAN BODIES; LOW POWER; MULTIPLAYERS; SIGNETRING; USER IDENTIFICATION;

EID: 84866614460     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2348543.2348569     Document Type: Conference Paper
Times cited : (63)

References (47)
  • 3
    • 84866632744 scopus 로고    scopus 로고
    • Vulnerabilities in biometric encryption systems
    • A. Adler. Vulnerabilities in biometric encryption systems. In Proc. of AVBPA, 2005.
    • (2005) Proc. of AVBPA
    • Adler, A.1
  • 9
    • 33751044073 scopus 로고    scopus 로고
    • Talking to strangers: Authentication in ad-hoc wireless networks
    • Feb.
    • D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. of NDSS, Feb. 2002.
    • (2002) Proc. of NDSS
    • Balfanz, D.1    Smetters, D.K.2    Stewart, P.3    Wong, H.C.4
  • 12
    • 84860735534 scopus 로고    scopus 로고
    • Mobile token-based authentication on a budget
    • Feb.
    • H. Bojinov and D. Boneh. Mobile token-based authentication on a budget. In Proc. of HotMobile, Feb. 2011.
    • (2011) Proc. of HotMobile
    • Bojinov, H.1    Boneh, D.2
  • 14
    • 0035750860 scopus 로고    scopus 로고
    • Diamondtouch: A multi-user touch technology
    • Nov.
    • P. Dietz and D. Leigh. Diamondtouch: a multi-user touch technology. In Proc. of UIST, Nov. 2001.
    • (2001) Proc. of UIST
    • Dietz, P.1    Leigh, D.2
  • 15
    • 84866624863 scopus 로고    scopus 로고
    • Digital Modulation Schemes. http://robotics.eecs.berkeley.edu/sastry/ ee20/modulation/node5.html.
    • Digital Modulation Schemes
  • 16
    • 81055156896 scopus 로고    scopus 로고
    • A closer look at recognition-based graphical passwords on mobile devices
    • July
    • P. Dunphy, A. P. Heiner, and N. Asokan. A closer look at recognition-based graphical passwords on mobile devices. In Proc. of SOUPS, July 2010.
    • (2010) Proc. of SOUPS
    • Dunphy, P.1    Heiner, A.P.2    Asokan, N.3
  • 17
    • 3142739783 scopus 로고    scopus 로고
    • On the vulnerability of biometric security systems
    • IEEE, June
    • M. Faundez-Zanuy. On the vulnerability of biometric security systems. Aerospace and Electronic Systems Magazine, IEEE, 19(6):3 - 8, June 2004.
    • (2004) Aerospace and Electronic Systems Magazine , vol.19 , Issue.6 , pp. 3-8
    • Faundez-Zanuy, M.1
  • 18
    • 84866606558 scopus 로고    scopus 로고
    • Apple facing class-action lawsuit over kids' in-app purchases
    • Apr.
    • C. Foresman. Apple facing class-action lawsuit over kids' in-app purchases. Ars Technica, Apr. 2011.
    • (2011) Ars Technica
    • Foresman, C.1
  • 23
    • 34249711260 scopus 로고    scopus 로고
    • Examining the content and privacy of web browsing incidental information
    • May
    • K. Hawkey and K. M. Inkpen. Examining the content and privacy of web browsing incidental information. In Proc. of WWW, May 2006.
    • (2006) Proc. of WWW
    • Hawkey, K.1    Inkpen, K.M.2
  • 25
    • 84860630609 scopus 로고
    • Touch displays: A programmed man-machine interface
    • E. A. Johnson. Touch Displays: A Programmed Man-Machine Interface. Ergonomics, 10(2):271-277, 1967.
    • (1967) Ergonomics , vol.10 , Issue.2 , pp. 271-277
    • Johnson, E.A.1
  • 26
    • 77954011711 scopus 로고    scopus 로고
    • Can i borrow your phone?: Understanding concerns when sharing mobile phones
    • Apr
    • A. K. Karlson, A. B. Brush, and S. Schechter. Can i borrow your phone?: understanding concerns when sharing mobile phones. In Proc. of CHI, Apr. 2009.
    • (2009) Proc. of CHI
    • Karlson, A.K.1    Brush, A.B.2    Schechter, S.3
  • 28
    • 70450230583 scopus 로고    scopus 로고
    • User evaluation of lightweight user authentication with a single tri-axis accelerometer
    • Sept.
    • J. Liu, L. Zhong, J. Wickramasuriya, and V. Vasudevan. User evaluation of lightweight user authentication with a single tri-axis accelerometer. In Proc. of MobileHCI, Sept. 2009.
    • (2009) Proc. of MobileHCI
    • Liu, J.1    Zhong, L.2    Wickramasuriya, J.3    Vasudevan, V.4
  • 30
  • 31
    • 65349086799 scopus 로고    scopus 로고
    • Shake well before use: Intuitive and secure pairing of mobile devices
    • Jun.
    • R. Mayrhofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE TMC, 8(6):792 -806, Jun. 2009.
    • (2009) IEEE TMC , vol.8 , Issue.6 , pp. 792-806
    • Mayrhofer, R.1    Gellersen, H.2
  • 36
    • 85008580440 scopus 로고    scopus 로고
    • Mobile device security using transient authentication
    • November
    • A. Nicholson, M. D. Corner, and B. D. Noble. Mobile Device Security using Transient Authentication. IEEE TMC, 5(11):1489-1502, November 2006.
    • (2006) IEEE TMC , vol.5 , Issue.11 , pp. 1489-1502
    • Nicholson, A.1    Corner, M.D.2    Noble, B.D.3
  • 37
    • 84866615915 scopus 로고    scopus 로고
    • Ringbow. http://ringbow.com/ringbow/.
    • Ringbow
  • 38
    • 78649627495 scopus 로고    scopus 로고
    • The IR ring: Authenticating users' touches on a multi-touch display
    • Oct.
    • V. Roth, P. Schmidt, and B. Güldenring. The IR ring: authenticating users' touches on a multi-touch display. In Proc. of UIST, Oct. 2010.
    • (2010) Proc. of UIST
    • Roth, V.1    Schmidt, P.2    Güldenring, B.3
  • 39
    • 84862069121 scopus 로고    scopus 로고
    • Touche: Enhancing touch interaction on humans, screens, liquids, and everyday objects
    • New York, NY, USA
    • M. Sato, I. Poupyrev, and C. Harrison. Touche: enhancing touch interaction on humans, screens, liquids, and everyday objects. In Proc. of CHI, pages 483-492, New York, NY, USA, 2012.
    • (2012) Proc. of CHI , pp. 483-492
    • Sato, M.1    Poupyrev, I.2    Harrison, C.3
  • 40
    • 77953838402 scopus 로고    scopus 로고
    • Cracking the bluetooth pin
    • Y. Shaked and A. Wool. Cracking the bluetooth pin. In Proc. of MobiSys, pages 39-50, 2005.
    • (2005) Proc. of MobiSys , pp. 39-50
    • Shaked, Y.1    Wool, A.2
  • 41
    • 84864335381 scopus 로고    scopus 로고
    • Can a smartphone make your car smarter?
    • E. Sofge. Can a smartphone make your car smarter? MSN Autos, 2010.
    • (2010) MSN Autos
    • Sofge, E.1
  • 43
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Apr.
    • F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proc. of Security Protocols, Apr. 2000.
    • (2000) Proc. of Security Protocols
    • Stajano, F.1    Anderson, R.J.2
  • 45
    • 33645449037 scopus 로고    scopus 로고
    • Body check: Biometric access protection devices and their programs put to the test
    • Nov.
    • L. Thalheim and J. Krissler. Body check: Biometric access protection devices and their programs put to the test. ct Magazine, Nov. 2002.
    • (2002) Ct Magazine
    • Thalheim, L.1    Krissler, J.2
  • 46
    • 78650022232 scopus 로고    scopus 로고
    • Testing metrics for password creation policies by attacking large sets of revealed passwords
    • Oct.
    • M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. of CCS, Oct. 2010.
    • (2010) Proc. of CCS
    • Weir, M.1    Aggarwal, S.2    Collins, M.3    Stern, H.4
  • 47
    • 84866615916 scopus 로고    scopus 로고
    • US 0232567 Patent - Capacitive Sensing Arrangment
    • W. Westerman and J. G. Elias. US 0232567 Patent - Capacitive Sensing Arrangment, 2006.
    • (2006)
    • Westerman, W.1    Elias, J.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.