User Authentication based on Personal Image Experiences

Tutkimustuotos: Artikkeli kirjassa/konferenssijulkaisussavertaisarvioitu

Standard

User Authentication based on Personal Image Experiences. / Nguyen, Ngu; Sigg, Stephan.

2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018. Institute of Electrical and Electronics Engineers, 2018. s. 336-341 8480087.

Tutkimustuotos: Artikkeli kirjassa/konferenssijulkaisussavertaisarvioitu

Harvard

Nguyen, N & Sigg, S 2018, User Authentication based on Personal Image Experiences. julkaisussa 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018., 8480087, Institute of Electrical and Electronics Engineers, Sivut 336-341, Athens, Kreikka, 19/03/2018. https://doi.org/10.1109/PERCOMW.2018.8480087

APA

Nguyen, N., & Sigg, S. (2018). User Authentication based on Personal Image Experiences. teoksessa 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018 (Sivut 336-341). [8480087] Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/PERCOMW.2018.8480087

Vancouver

Nguyen N, Sigg S. User Authentication based on Personal Image Experiences. julkaisussa 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018. Institute of Electrical and Electronics Engineers. 2018. s. 336-341. 8480087 https://doi.org/10.1109/PERCOMW.2018.8480087

Author

Nguyen, Ngu ; Sigg, Stephan. / User Authentication based on Personal Image Experiences. 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018. Institute of Electrical and Electronics Engineers, 2018. Sivut 336-341

Bibtex - Lataa

@inproceedings{73dd871bd4d74a868d66698b807fd3fc,
title = "User Authentication based on Personal Image Experiences",
abstract = "Building upon the concept of collective computing [1], which combines cloud, crowd and shroud technologies, we propose a further application domain for the fourth generation of computing: Usable Security. Combining the three constituent technologies enables novel, stronger and personalized authentication mechanisms. In particular, we combine implicit memory of people (the crowd), obtained from wearable camera devices (the shroud) and supported by edge and cloud facility (the cloud) in order to generate image-based authentication challenges which are transient and personalized.",
author = "Ngu Nguyen and Stephan Sigg",
year = "2018",
month = "10",
day = "2",
doi = "10.1109/PERCOMW.2018.8480087",
language = "English",
pages = "336--341",
booktitle = "2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018",
publisher = "Institute of Electrical and Electronics Engineers",
address = "United States",

}

RIS - Lataa

TY - GEN

T1 - User Authentication based on Personal Image Experiences

AU - Nguyen, Ngu

AU - Sigg, Stephan

PY - 2018/10/2

Y1 - 2018/10/2

N2 - Building upon the concept of collective computing [1], which combines cloud, crowd and shroud technologies, we propose a further application domain for the fourth generation of computing: Usable Security. Combining the three constituent technologies enables novel, stronger and personalized authentication mechanisms. In particular, we combine implicit memory of people (the crowd), obtained from wearable camera devices (the shroud) and supported by edge and cloud facility (the cloud) in order to generate image-based authentication challenges which are transient and personalized.

AB - Building upon the concept of collective computing [1], which combines cloud, crowd and shroud technologies, we propose a further application domain for the fourth generation of computing: Usable Security. Combining the three constituent technologies enables novel, stronger and personalized authentication mechanisms. In particular, we combine implicit memory of people (the crowd), obtained from wearable camera devices (the shroud) and supported by edge and cloud facility (the cloud) in order to generate image-based authentication challenges which are transient and personalized.

UR - http://www.scopus.com/inward/record.url?scp=85056462929&partnerID=8YFLogxK

U2 - 10.1109/PERCOMW.2018.8480087

DO - 10.1109/PERCOMW.2018.8480087

M3 - Conference contribution

SP - 336

EP - 341

BT - 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018

PB - Institute of Electrical and Electronics Engineers

ER -

ID: 29862330