User Authentication based on Personal Image Experiences

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Standard

User Authentication based on Personal Image Experiences. / Nguyen, Ngu; Sigg, Stephan.

2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018. IEEE, 2018. p. 336-341 8480087.

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Harvard

Nguyen, N & Sigg, S 2018, User Authentication based on Personal Image Experiences. in 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018., 8480087, IEEE, pp. 336-341, IEEE International Conference on Pervasive Computing and Communications Workshops, Athens, Greece, 19/03/2018. https://doi.org/10.1109/PERCOMW.2018.8480087

APA

Nguyen, N., & Sigg, S. (2018). User Authentication based on Personal Image Experiences. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018 (pp. 336-341). [8480087] IEEE. https://doi.org/10.1109/PERCOMW.2018.8480087

Vancouver

Nguyen N, Sigg S. User Authentication based on Personal Image Experiences. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018. IEEE. 2018. p. 336-341. 8480087 https://doi.org/10.1109/PERCOMW.2018.8480087

Author

Nguyen, Ngu ; Sigg, Stephan. / User Authentication based on Personal Image Experiences. 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018. IEEE, 2018. pp. 336-341

Bibtex - Download

@inproceedings{73dd871bd4d74a868d66698b807fd3fc,
title = "User Authentication based on Personal Image Experiences",
abstract = "Building upon the concept of collective computing [1], which combines cloud, crowd and shroud technologies, we propose a further application domain for the fourth generation of computing: Usable Security. Combining the three constituent technologies enables novel, stronger and personalized authentication mechanisms. In particular, we combine implicit memory of people (the crowd), obtained from wearable camera devices (the shroud) and supported by edge and cloud facility (the cloud) in order to generate image-based authentication challenges which are transient and personalized.",
author = "Ngu Nguyen and Stephan Sigg",
year = "2018",
month = "10",
day = "2",
doi = "10.1109/PERCOMW.2018.8480087",
language = "English",
pages = "336--341",
booktitle = "2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018",
publisher = "IEEE",
address = "United States",

}

RIS - Download

TY - GEN

T1 - User Authentication based on Personal Image Experiences

AU - Nguyen, Ngu

AU - Sigg, Stephan

PY - 2018/10/2

Y1 - 2018/10/2

N2 - Building upon the concept of collective computing [1], which combines cloud, crowd and shroud technologies, we propose a further application domain for the fourth generation of computing: Usable Security. Combining the three constituent technologies enables novel, stronger and personalized authentication mechanisms. In particular, we combine implicit memory of people (the crowd), obtained from wearable camera devices (the shroud) and supported by edge and cloud facility (the cloud) in order to generate image-based authentication challenges which are transient and personalized.

AB - Building upon the concept of collective computing [1], which combines cloud, crowd and shroud technologies, we propose a further application domain for the fourth generation of computing: Usable Security. Combining the three constituent technologies enables novel, stronger and personalized authentication mechanisms. In particular, we combine implicit memory of people (the crowd), obtained from wearable camera devices (the shroud) and supported by edge and cloud facility (the cloud) in order to generate image-based authentication challenges which are transient and personalized.

UR - http://www.scopus.com/inward/record.url?scp=85056462929&partnerID=8YFLogxK

U2 - 10.1109/PERCOMW.2018.8480087

DO - 10.1109/PERCOMW.2018.8480087

M3 - Conference contribution

SP - 336

EP - 341

BT - 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018

PB - IEEE

ER -

ID: 29862330