CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing

Keita Watanabe, Fumito Higuchi, Masahiko Inami, Takeo Igarashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

More and more services and information are being stored on the cloud. Since anybody can access an Internet terminal, it is critical to provide appropriate security mechanisms. One popular approach is to strengthen the protocol and encryption algorithm, which is now being actively investigated in the security field. Another potentially effective approach is to enhance the user interface for security systems. Since security is ultimately a human-computer interaction problem, we believe that there are many interesting opportunities related to the latter approach.

Original languageEnglish
Title of host publicationSIGGRAPH Asia 2012 Emerging Technologies, SA 2012
DOIs
Publication statusPublished - 2012 Dec 1
EventSIGGRAPH Asia 2012 Emerging Technologies, SA 2012 - Singapore, Singapore
Duration: 2012 Nov 282012 Dec 1

Publication series

NameSIGGRAPH Asia 2012 Emerging Technologies, SA 2012

Other

OtherSIGGRAPH Asia 2012 Emerging Technologies, SA 2012
Country/TerritorySingapore
CitySingapore
Period12/11/2812/12/1

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Computer Vision and Pattern Recognition

Fingerprint

Dive into the research topics of 'CursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing'. Together they form a unique fingerprint.

Cite this