Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices us...
Alex Varshavsky, Adin Scannell, Anthony LaMarca, E...
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
This paper reviews characteristics of human face recognition that should be reflected in any psychologically plausible computational model of face recognition. We then summarise r...
Abstract. For many years, the HCI community has harbored a vision of interacting with intelligent, embodied computer agents. However, the reality of this vision remains elusive. Fr...
Jodi Forlizzi, John Zimmerman, Vince Mancuso, Sony...