{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:34:48Z","timestamp":1774992888131,"version":"3.50.1"},"reference-count":53,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T00:00:00Z","timestamp":1537228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1329686"],"award-info":[{"award-number":["CNS-1329686"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2018,9,18]]},"abstract":"<jats:p>Token-based proximity authentication methods that authenticate users based on physical proximity are effortless, but lack explicit user intentionality, which may result in accidental logins. For example, a user may get logged in when she is near a computer or just passing by, even if she does not intend to use that computer. Lack of user intentionality in proximity-based methods makes them less suitable for multi-user shared computer environments, despite their desired usability benefits over passwords. We present an authentication method for desktops called Seamless Authentication using Wristbands (SAW), which addresses the lack of intentionality limitation of proximity-based methods. SAW uses a low-effort user input step for explicitly conveying user intentionality, while keeping the overall usability of the method better than password-based methods. In SAW, a user wears a wristband that acts as the user's identity token, and to authenticate to a desktop, the user provides a low-effort input by tapping a key on the keyboard multiple times or wiggling the mouse with the wristband hand. This input to the desktop conveys that someone wishes to log in to the desktop, and SAW verifies the user who wishes to log in by confirming the user's proximity and correlating the received keyboard or mouse inputs with the user's wrist movement, as measured by the wristband. In our feasibility user study (n=17), SAW proved quick to authenticate (within two seconds), with a low false-negative rate of 2.5% and worst-case false-positive rate of 1.8%. In our user perception study (n=16), a majority of the participants rated it as more usable than passwords.<\/jats:p>","DOI":"10.1145\/3264935","type":"journal-article","created":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T11:58:41Z","timestamp":1537358321000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["SAW"],"prefix":"10.1145","volume":"2","author":[{"given":"Shrirang","family":"Mare","sequence":"first","affiliation":[{"name":"Paul G. Allen School of Computer Science, University of Washington, Seattle, WA, USA"}]},{"given":"Reza","family":"Rawassizadeh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Rochestor, Rochestor, NY, USA"}]},{"given":"Ronald","family":"Peterson","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Dartmouth College, Hanover, NH, USA"}]},{"given":"David","family":"Kotz","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Dartmouth College, Hanover, NH, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,9,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.886017"},{"key":"e_1_2_1_3_1","unstructured":"android 2018. Face Unlock On Android 4.0. http:\/\/www.huffingtonpost.com\/2011\/10\/19\/face-unlock-ice-cream-sandwich_n_1020207.html android 2018. Face Unlock On Android 4.0. http:\/\/www.huffingtonpost.com\/2011\/10\/19\/face-unlock-ice-cream-sandwich_n_1020207.html"},{"key":"e_1_2_1_4_1","volume-title":"Retrieved","author":"Apple","year":"2018","unstructured":"Apple 2018 . Apple Watch . Retrieved May 11, 2018 from https:\/\/www.apple.com\/watch\/ Apple 2018. Apple Watch. Retrieved May 11, 2018 from https:\/\/www.apple.com\/watch\/"},{"key":"e_1_2_1_5_1","volume-title":"Retrieved","author":"Unlock Apple","year":"2018","unstructured":"Apple Unlock 2018 . How to Unlock Your Mac with Your Apple Watch - Apple Support . Retrieved May 11, 2018 from https:\/\/support.apple.com\/en-us\/HT206995 Apple Unlock 2018. How to Unlock Your Mac with Your Apple Watch - Apple Support. Retrieved May 11, 2018 from https:\/\/support.apple.com\/en-us\/HT206995"},{"key":"e_1_2_1_6_1","volume-title":"Retrieved","author":"Atama","year":"2018","unstructured":"Atama 2018 . Atama Sesame 2 Wireless Proximity Lock . Retrieved May 11, 2018 from https:\/\/atama.io\/sesame2 Atama 2018. Atama Sesame 2 Wireless Proximity Lock. Retrieved May 11, 2018 from https:\/\/atama.io\/sesame2"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.28"},{"key":"e_1_2_1_8_1","volume-title":"Understanding Your Users: A Practical Guide to User Research Methods","author":"Baxter Kathy","unstructured":"Kathy Baxter , Catherine Courage , and Kelly Caine . 2015. Understanding Your Users: A Practical Guide to User Research Methods ( second ed.). Morgan Kaufmann . Kathy Baxter, Catherine Courage, and Kelly Caine. 2015. Understanding Your Users: A Practical Guide to User Research Methods (second ed.). Morgan Kaufmann."},{"key":"e_1_2_1_9_1","volume-title":"New York Times. Retrieved","author":"Bilton Nick","year":"2015","unstructured":"Nick Bilton . 2015 . Keeping Your Car Safe from Thieves . New York Times. Retrieved May 11, 2018 from https:\/\/www.nytimes.com\/2015\/04\/16\/style\/keeping-your-car-safe-from-electronic-thieves.html Nick Bilton. 2015. Keeping Your Car Safe from Thieves. New York Times. Retrieved May 11, 2018 from https:\/\/www.nytimes.com\/2015\/04\/16\/style\/keeping-your-car-safe-from-electronic-thieves.html"},{"key":"e_1_2_1_10_1","unstructured":"bluetooth {n. d.}. Bluetooth technology adding mesh networking to spur new wave of innovation. https:\/\/www.bluetooth.com\/news\/pressreleases\/2015\/02\/24\/bluetoothtechnology-adding-mesh-networking-to-spur-new-wave-of-innovation Last accessed May 2018. bluetooth {n. d.}. Bluetooth technology adding mesh networking to spur new wave of innovation. https:\/\/www.bluetooth.com\/news\/pressreleases\/2015\/02\/24\/bluetoothtechnology-adding-mesh-networking-to-spur-new-wave-of-innovation Last accessed May 2018."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_2_1_13_1","volume-title":"SUS - A Quick and Dirty Usability Scale. Usability evaluation in industry 189, 194","author":"Brooke John","year":"1996","unstructured":"John Brooke and Others. 1996. SUS - A Quick and Dirty Usability Scale. Usability evaluation in industry 189, 194 ( 1996 ), 4--7. John Brooke and Others. 1996. SUS - A Quick and Dirty Usability Scale. Usability evaluation in industry 189, 194 (1996), 4--7."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594369"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570647"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS). https:\/\/www.semanticscholar.org\/paper\/26e6b1675e081a514f4fdc0352d6cb211ba6d9c8","author":"Francillon Aur\u00e9lien","year":"2010","unstructured":"Aur\u00e9lien Francillon , Boris Danev , and Srdjan Capkun . 2010 . Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars . In Proceedings of the Network and Distributed Systems Security Symposium (NDSS). https:\/\/www.semanticscholar.org\/paper\/26e6b1675e081a514f4fdc0352d6cb211ba6d9c8 Aur\u00e9lien Francillon, Boris Danev, and Srdjan Capkun. 2010. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS). https:\/\/www.semanticscholar.org\/paper\/26e6b1675e081a514f4fdc0352d6cb211ba6d9c8"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1926325.1926331"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378607"},{"key":"e_1_2_1_20_1","volume-title":"Retrieved","author":"Health","year":"2018","unstructured":"Health 2018 . HealthCast Inc . Retrieved May 11, 2018 from http:\/\/www.gohealthcast.com\/index.html Health 2018. HealthCast Inc. Retrieved May 11, 2018 from http:\/\/www.gohealthcast.com\/index.html"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.74"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS).","author":"Huhta Otto","unstructured":"Otto Huhta , Swapnil Udar , Mika Juuti , Prakash Shrestha , Nitesh Saxena , and N. Asokan . 2016. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks . In Proceedings of the Network and Distributed Systems Security Symposium (NDSS). Otto Huhta, Swapnil Udar, Mika Juuti, Prakash Shrestha, Nitesh Saxena, and N. Asokan. 2016. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.32"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Ross Koppel Sean Smith Jim Blythe and Vijay Kothari. 2015. Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? Driving Quality in Informatics: Fulfilling the Promise -- Studies In Health Technology and Informatics 208 (Feb. 2015) 215--235. http:\/\/www.cs.dartmouth.edu\/~sws\/pubs\/ksbk15-draft.pdf Ross Koppel Sean Smith Jim Blythe and Vijay Kothari. 2015. Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? Driving Quality in Informatics: Fulfilling the Promise -- Studies In Health Technology and Informatics 208 (Feb. 2015) 215--235. http:\/\/www.cs.dartmouth.edu\/~sws\/pubs\/ksbk15-draft.pdf","DOI":"10.3233\/978-1-61499-488-6-215"},{"key":"e_1_2_1_26_1","unstructured":"Robert J. Kosinski. 2013. A literature review on reaction time. http:\/\/www.cognaction.org\/cogs105\/readings\/clemson.rt.pdf Robert J. Kosinski. 2013. A literature review on reaction time. http:\/\/www.cognaction.org\/cogs105\/readings\/clemson.rt.pdf"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2012.07.003"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.07.008"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358801"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30182-0_29"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057210"},{"key":"e_1_2_1_32_1","unstructured":"MacID 2018. MacID - Unlock Your Mac with Just Your Fingerprint. https:\/\/www.macid.co MacID 2018. MacID - Unlock Your Mac with Just Your Fingerprint. https:\/\/www.macid.co"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS). https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/mare","author":"Mare Shrirang","year":"2016","unstructured":"Shrirang Mare , Mary Baker , and Jeremy Gummeson . 2016 . A Study of Authentication in Daily Life . In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/mare Shrirang Mare, Mary Baker, and Jeremy Gummeson. 2016. A Study of Authentication in Daily Life. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/mare"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.51"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.51"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS). http:\/\/flyer.sis.smu.edu.sg\/ndss13-tey.pdf","author":"Meng Tey C.","year":"2013","unstructured":"Tey C. Meng , Payas Gupta , and Debin Gao . 2013 . I can be you: Questioning the use of Keystroke Dynamics as Biometrics . In Proceedings of the Network and Distributed Systems Security Symposium (NDSS). http:\/\/flyer.sis.smu.edu.sg\/ndss13-tey.pdf Tey C. Meng, Payas Gupta, and Debin Gao. 2013. I can be you: Questioning the use of Keystroke Dynamics as Biometrics. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS). http:\/\/flyer.sis.smu.edu.sg\/ndss13-tey.pdf"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"e_1_2_1_41_1","unstructured":"NFC 2018. NFC Ring - Safe Simple Secure. http:\/\/nfcring.com NFC 2018. NFC Ring - Safe Simple Secure. http:\/\/nfcring.com"},{"key":"e_1_2_1_42_1","volume-title":"Retrieved","author":"Nymi","year":"2018","unstructured":"Nymi 2018 . Nymi . Retrieved May 11, 2018 from https:\/\/nymi.com Nymi 2018. Nymi. Retrieved May 11, 2018 from https:\/\/nymi.com"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535813.2535819"},{"key":"e_1_2_1_44_1","volume-title":"Are We Really Close? Verifying Proximity in Wireless Systems","author":"Ranganathan Aanjhan","year":"2017","unstructured":"Aanjhan Ranganathan and Srdjan Capkun . 2017. Are We Really Close? Verifying Proximity in Wireless Systems . IEEE Security 8 Privacy ( 2017 ). Aanjhan Ranganathan and Srdjan Capkun. 2017. Are We Really Close? Verifying Proximity in Wireless Systems. IEEE Security 8 Privacy (2017)."},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the USENIX Security Symposium (USENIX Security). 25","author":"Kasper","unstructured":"Kasper B. Rasmussen and Srdjan \u010capkun. 2010. Realization of RF Distance Bounding . In Proceedings of the USENIX Security Symposium (USENIX Security). 25 . http:\/\/www.usenix.org\/events\/sec10\/tech\/full_papers\/Rasmussen.pdf Kasper B. Rasmussen and Srdjan \u010capkun. 2010. Realization of RF Distance Bounding. In Proceedings of the USENIX Security Symposium (USENIX Security). 25. http:\/\/www.usenix.org\/events\/sec10\/tech\/full_papers\/Rasmussen.pdf"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.011591063"},{"key":"e_1_2_1_47_1","volume-title":"Retrieved","year":"2018","unstructured":"reaction 2018 . Human Reaction Time Test . Retrieved May 11, 2018 from http:\/\/www.humanbenchmark.com\/tests\/reactiontime\/ reaction 2018. Human Reaction Time Test. Retrieved May 11, 2018 from http:\/\/www.humanbenchmark.com\/tests\/reactiontime\/"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1018"},{"key":"e_1_2_1_49_1","volume-title":"Retrieved","author":"Shimmer","year":"2018","unstructured":"Shimmer 2018 . Shimmer Research . Retrieved May 11, 2018 from http:\/\/www.shimmersensing.com Shimmer 2018. Shimmer Research. Retrieved May 11, 2018 from http:\/\/www.shimmersensing.com"},{"key":"e_1_2_1_51_1","first-page":"1","article-title":"GNU Parallel: The Command-Line Power Tool. login","volume":"36","author":"Tange Ole","year":"2011","unstructured":"Ole Tange . 2011 . GNU Parallel: The Command-Line Power Tool. login : The USENIX Magazine 36 , 1 (Feb 2011), 42--47. Ole Tange. 2011. GNU Parallel: The Command-Line Power Tool. login: The USENIX Magazine 36, 1 (Feb 2011), 42--47.","journal-title":"The USENIX Magazine"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420976"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_2_1_55_1","first-page":"1","article-title":"Reaction Time, Speed of Performance, and Age","volume":"515","author":"Welford A. T.","year":"1988","unstructured":"A. T. Welford . 1988 . Reaction Time, Speed of Performance, and Age . Central Determinants of Age-Related Declines in Motor Function 515 , 1 (Jan. 1988), 1--17. A. T. Welford. 1988. Reaction Time, Speed of Performance, and Age. Central Determinants of Age-Related Declines in Motor Function 515, 1 (Jan. 1988), 1--17.","journal-title":"Central Determinants of Age-Related Declines in Motor Function"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264935","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264935","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T21:48:31Z","timestamp":1751924911000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264935"}},"subtitle":["Wristband-based Authentication for Desktop Computers"],"short-title":[],"issued":{"date-parts":[[2018,9,18]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,9,18]]}},"alternative-id":["10.1145\/3264935"],"URL":"https:\/\/doi.org\/10.1145\/3264935","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,18]]},"assertion":[{"value":"2017-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}