Visible to the public Biblio

Filters: Keyword is eye-tracking  [Clear All Filters]
2019-11-12
Katsini, Christina, Raptis, George E., Fidas, Christos, Avouris, Nikolaos.  2018.  Towards Gaze-Based Quantification of the Security of Graphical Authentication Schemes. Proceedings of the 2018 ACM Symposium on Eye Tracking Research & Applications. :17:1-17:5.

In this paper, we introduce a two-step method for estimating the strength of user-created graphical passwords based on the eye-gaze behaviour during password composition. First, the individuals' gaze patterns, represented by the unique fixations on each area of interest (AOI) and the total fixation duration per AOI, are calculated. Second, the gaze-based entropy of the individual is calculated. To investigate whether the proposed metric is a credible predictor of the password strength, we conducted two feasibility studies. Results revealed a strong positive correlation between the strength of the created passwords and the gaze-based entropy. Hence, we argue that the proposed gaze-based metric allows for unobtrusive prediction of the strength of the password a user is going to create and enables intervention to the password composition for helping users create stronger passwords.

2019-02-25
Grynszpan, Ouriel, Mouquet, Esther, Rushworth, Matthew, Sallet, Jérôme, Khamassi, Mehdi.  2018.  Computational Model of the User's Learning Process When Cued by a Social Versus Non-Social Agent. Proceedings of the 6th International Conference on Human-Agent Interaction. :347-349.
There are ongoing debates on whether learning involves the same mechanisms when it is mediated by social skills than when it is not [1]. Gaze cues serve as a strong communicative modality that is profoundly human. They have been shown to trigger automatic attentional orienting [2]. However, arrow cues have been shown to elicit similar effects [3]. Hence, gaze and arrow cues are often compared to investigate differences between social and non-social cognitive processes [4]. The present study sought to compare cued learning when the cue is provided by a social agent versus a nonsocial agent.
2018-08-23
Belk, Marios, Pamboris, Andreas, Fidas, Christos, Katsini, Christina, Avouris, Nikolaos, Samaras, George.  2017.  Sweet-spotting Security and Usability for Intelligent Graphical Authentication Mechanisms. Proceedings of the International Conference on Web Intelligence. :252–259.
This paper investigates the trade-off between security and usability in recognition-based graphical authentication mechanisms. Through a user study (N=103) based on a real usage scenario, it draws insights about the security strength and memorability of a chosen password with respect to the amount of images presented to users during sign-up. In particular, it reveals the users' predisposition in following predictable patterns when selecting graphical passwords, and its effect on practical security strength. It also demonstrates that a "sweet-spot" exists between security and usability in graphical authentication approaches on the basis of adjusting accordingly the image grid size presented to users when creating passwords. The results of the study can be leveraged by researchers and practitioners engaged in designing intelligent graphical authentication user interfaces for striking an appropriate balance between security and usability.