Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999. ,
DOI : 10.1145/322796.322806
Usability Evaluation of IVR Systems with DTMF and ASR, Proc. of ICSLP'98, 1998. ,
Recent advances in biometric person authentication, IEEE International Conference on Acoustics Speech and Signal Processing, pp.4060-4063, 2002. ,
DOI : 10.1109/ICASSP.2002.5745549
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.2173
Enhancing Authentication to Secure the Open Enterprise, Whitepaper commissioned by VerySign (Symantec), 2010. ,
An Introduction to Biometric Recognition IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image-and Video- Based Biometrics, 2004. ,
Evaluation of IVR data collection UIs for untrained rural users, Proceedings of the First ACM Symposium on Computing for Development, ACM DEV '10, pp.1-28, 2010. ,
DOI : 10.1145/1926180.1926183
Mercury: Recovering Forgotten Passwords Using Personal Devices. Financial Cryptography and Data Security, pp.315-330, 2012. ,
DOI : 10.1007/978-3-642-27576-0_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.546
Understanding user perspectives on biometric technology, Communications of the ACM, vol.51, issue.9, pp.115-118, 2008. ,
DOI : 10.1145/1378727.1389971
Personal knowledge questions for fallback authentication, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.13-23, 2008. ,
DOI : 10.1145/1408664.1408667
The use of passwords for controlling access to remote computer systems and services, Proceedings of the June 13-16, 1977, national computer conference on, AFIPS '77, pp.27-33, 1977. ,
DOI : 10.1145/1499402.1499410