CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing

Keita Watanabe, Fumito Higuchi, Masahiko Inami, Takeo Igarashi

研究成果: Conference contribution

8 引用 (Scopus)

抄録

More and more services and information are being stored on the cloud. Since anybody can access an Internet terminal, it is critical to provide appropriate security mechanisms. One popular approach is to strengthen the protocol and encryption algorithm, which is now being actively investigated in the security field. Another potentially effective approach is to enhance the user interface for security systems. Since security is ultimately a human-computer interaction problem, we believe that there are many interesting opportunities related to the latter approach.

元の言語English
ホスト出版物のタイトルSIGGRAPH Asia 2012 Emerging Technologies, SA 2012
DOI
出版物ステータスPublished - 2012
外部発表Yes
イベントSIGGRAPH Asia 2012 Emerging Technologies, SA 2012 - Singapore, Singapore
継続期間: 2012 11 282012 12 1

Other

OtherSIGGRAPH Asia 2012 Emerging Technologies, SA 2012
Singapore
Singapore
期間12/11/2812/12/1

Fingerprint

Human computer interaction
Security systems
User interfaces
Cryptography
Internet
Network protocols

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Computer Vision and Pattern Recognition

これを引用

Watanabe, K., Higuchi, F., Inami, M., & Igarashi, T. (2012). CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing. : SIGGRAPH Asia 2012 Emerging Technologies, SA 2012 [2407713] https://doi.org/10.1145/2407707.2407713

CursorCamouflage : Multiple dummy cursors as a defense against shoulder surfing. / Watanabe, Keita; Higuchi, Fumito; Inami, Masahiko; Igarashi, Takeo.

SIGGRAPH Asia 2012 Emerging Technologies, SA 2012. 2012. 2407713.

研究成果: Conference contribution

Watanabe, K, Higuchi, F, Inami, M & Igarashi, T 2012, CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing. : SIGGRAPH Asia 2012 Emerging Technologies, SA 2012., 2407713, SIGGRAPH Asia 2012 Emerging Technologies, SA 2012, Singapore, Singapore, 12/11/28. https://doi.org/10.1145/2407707.2407713
Watanabe K, Higuchi F, Inami M, Igarashi T. CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing. : SIGGRAPH Asia 2012 Emerging Technologies, SA 2012. 2012. 2407713 https://doi.org/10.1145/2407707.2407713
Watanabe, Keita ; Higuchi, Fumito ; Inami, Masahiko ; Igarashi, Takeo. / CursorCamouflage : Multiple dummy cursors as a defense against shoulder surfing. SIGGRAPH Asia 2012 Emerging Technologies, SA 2012. 2012.
@inproceedings{5027d38c69c04f4099592f606684a98f,
title = "CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing",
abstract = "More and more services and information are being stored on the cloud. Since anybody can access an Internet terminal, it is critical to provide appropriate security mechanisms. One popular approach is to strengthen the protocol and encryption algorithm, which is now being actively investigated in the security field. Another potentially effective approach is to enhance the user interface for security systems. Since security is ultimately a human-computer interaction problem, we believe that there are many interesting opportunities related to the latter approach.",
author = "Keita Watanabe and Fumito Higuchi and Masahiko Inami and Takeo Igarashi",
year = "2012",
doi = "10.1145/2407707.2407713",
language = "English",
isbn = "9781450319126",
booktitle = "SIGGRAPH Asia 2012 Emerging Technologies, SA 2012",

}

TY - GEN

T1 - CursorCamouflage

T2 - Multiple dummy cursors as a defense against shoulder surfing

AU - Watanabe, Keita

AU - Higuchi, Fumito

AU - Inami, Masahiko

AU - Igarashi, Takeo

PY - 2012

Y1 - 2012

N2 - More and more services and information are being stored on the cloud. Since anybody can access an Internet terminal, it is critical to provide appropriate security mechanisms. One popular approach is to strengthen the protocol and encryption algorithm, which is now being actively investigated in the security field. Another potentially effective approach is to enhance the user interface for security systems. Since security is ultimately a human-computer interaction problem, we believe that there are many interesting opportunities related to the latter approach.

AB - More and more services and information are being stored on the cloud. Since anybody can access an Internet terminal, it is critical to provide appropriate security mechanisms. One popular approach is to strengthen the protocol and encryption algorithm, which is now being actively investigated in the security field. Another potentially effective approach is to enhance the user interface for security systems. Since security is ultimately a human-computer interaction problem, we believe that there are many interesting opportunities related to the latter approach.

UR - http://www.scopus.com/inward/record.url?scp=84871784571&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84871784571&partnerID=8YFLogxK

U2 - 10.1145/2407707.2407713

DO - 10.1145/2407707.2407713

M3 - Conference contribution

AN - SCOPUS:84871784571

SN - 9781450319126

BT - SIGGRAPH Asia 2012 Emerging Technologies, SA 2012

ER -