User authentication interfaces in mobile devices: Some design considerations

Hai Ning Liang, Charles Fleming, Wei Wang

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

2 Citations (Scopus)

Abstract

The use of mobile devices has been increasing for the last decade. With more powerful capabilities, they are replacing desktop computers. With this, there are also security concerns, one of which is the user authentication. When dealing with mobile phones, an important aspect is usability, as often users may play more importance to how usable programs or functionalities are than how secure they may be. In this paper, we look at user authentication from the perspective of usability. We aim to see what can constitute secure user authentication interfaces for mobile devices. We explore what has been done, and what considerations, from both the hardware to software to usability issues of these interfaces. We hope that just as important as security is, designers should also look at usability concerns.

Original languageEnglish
Title of host publicationProceedings - 17th IEEE International Conference on Computational Science and Engineering, CSE 2014, Jointly with 13th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2014, 13th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2014 and 8th International Conference on Frontier of Computer Science and Technology, FCST 2014
EditorsXingang Liu, Didier El Baz, Ching-Hsien Hsu, Kai Kang, Weifeng Chen
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages754-757
Number of pages4
ISBN (Electronic)9781479979813
DOIs
Publication statusPublished - 26 Jan 2015
Event17th IEEE International Conference on Computational Science and Engineering, CSE 2014 - Jointly with 13th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2014, 13th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2014 and 8th International Conference on Frontier of Computer Science and Technology, FCST 2014 - Chengdu, China
Duration: 19 Dec 201421 Dec 2014

Publication series

NameProceedings - 17th IEEE International Conference on Computational Science and Engineering, CSE 2014, Jointly with 13th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2014, 13th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2014 and 8th International Conference on Frontier of Computer Science and Technology, FCST 2014

Conference

Conference17th IEEE International Conference on Computational Science and Engineering, CSE 2014 - Jointly with 13th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2014, 13th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2014 and 8th International Conference on Frontier of Computer Science and Technology, FCST 2014
Country/TerritoryChina
CityChengdu
Period19/12/1421/12/14

Keywords

  • Design framework
  • Mobile devices
  • Security
  • Usability
  • User identification
  • User studies

Fingerprint

Dive into the research topics of 'User authentication interfaces in mobile devices: Some design considerations'. Together they form a unique fingerprint.

Cite this