home button

Coauthentication

Overview

This project investigates techniques for multiple devices to work together, to authenticate users.

Publications

An Evaluation of the Power Consumption of Coauthentication as a Continuous User Authentication Method in Mobile Systems. Brandon Corn, Ashley Ruiz, Alfredo Perez, Cagri Cetin, and Jay Ligatti. Proceedings of the Annual ACM Southeast Conference (ACMSE), April 2020.

A Dual-Task Interference Game-Based Experimental Framework for Comparing the Usability of Authentication Methods. Jean-Baptiste Subils, Joseph Perez, Peiwei Liu, Shamaria Engram, Cagri Cetin, Dmitry Goldgof, Natalie Ebner, Daniela Oliveira, and Jay Ligatti. Proceedings of the IEEE International Conference on Human System Interaction (HSI), June 2019.

Coauthentication. Jay Ligatti, Cagri Cetin, Shamaria Engram, Jean-Baptiste Subils, Dmitry Goldgof. Proceedings of the ACM Symposium on Applied Computing (SAC), April, 2019.

Coauthentication. Jay Ligatti, Cagri Cetin, Shamaria Engram, Jean-Baptiste Subils, Dmitry Goldgof. USF Technical Report CSE-SEC-092418. September 2018.

ProVerif Coauthentication Files. Cagri Cetin and Jay Ligatti. May 2018.

Coauthentication. Jay Ligatti, Cagri Cetin, Shamaria Engram, Jean-Baptiste Subils, Dmitry Goldgof. USF Technical Report Auth-7-17-17. July 2017. [BibTeX]

Slides from a talk on coauthentication, given at DITACS, October 2017.

(Outdated; please visit the GitHub project page for the latest version) ProVerif Coauthentication Files. Cagri Cetin and Jay Ligatti. July 2017.

System and methods for authentication using multiple devices. Jay Ligatti, Dmitry Goldgof, Cagri Cetin, and Jean-Baptiste Subils. US Patent 9,659,160. May 2017.

Systems and methods for anonymous authentication using multiple devices. Jay Ligatti, Dmitry Goldgof, Cagri Cetin, and Jean-Baptiste Subils. US Patent 9,380,058. April 2015 (priority date December 2014).

Authentication through Multi-Device Interaction. Cagri Cetin and Jean-Baptiste Subils. Presented during student-presentation day of the Foundations of Software Security course, April 2014.

CLOSE X