Understanding secure and usable gestures for realtime motion based authentication.
Yanyan LiMengjun XiePublished in: INFOCOM Workshops (2018)
Keyphrases
- authentication scheme
- user authentication
- hand gestures
- authentication mechanism
- real time
- data encryption
- authentication protocol
- identity management
- motion estimation
- security analysis
- security mechanisms
- image sequences
- hand motion
- security requirements
- key distribution
- optical flow
- password authentication
- motion analysis
- motion capture
- integrity verification
- secure manner
- body movements
- gesture recognition
- motion model
- factor authentication
- moving objects
- security issues
- camera motion
- access control
- public key encryption
- encryption decryption
- public key infrastructure
- hidden markov models
- secure communication
- human computer interaction
- motion patterns
- human robot interaction