Hugh Wimberly | New Mexico Tech (original) (raw)

Hugh Wimberly

Uploads

Papers by Hugh Wimberly

Research paper thumbnail of Adding a Biometric Authenticator to Reduce System Security: An Empirical Study

Abstract Choosing the security architecture and policies for a system is a demanding task that mu... more Abstract Choosing the security architecture and policies for a system is a demanding task that must be informed by an understanding of user behaviors. We investigate the hypothesis that adding visible security features to a system increases user confidence in the security of a system and thus causes users to behave less securely overall. In our study, we had 94 volunteers each create a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Potential Reductions in Overall System Security Caused by Using Fingerprint Authentication

ABSTRACT Choosing the security architecture and policies for a system is a demanding task that mu... more ABSTRACT Choosing the security architecture and policies for a system is a demanding task that must be informed by an understanding of user behaviors. Through a user study, I investigate the hypothesis that adding visible security features to a system increases user confidence in the security of a system and thus causes users to behave less securely overall. In the study, 94 volunteers each created a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using GPU Programming for Inverse Spectroscopy

Abstract: The Idaho National Laboratory (INL) has developed a detector that relies heavily on com... more Abstract: The Idaho National Laboratory (INL) has developed a detector that relies heavily on computationally expensive inverse spectroscopy algorithms to determine probabilistic three dimensional mappings of the source and its intensity. This inverse spectroscopy algorithm applies to material accountability by determining the location and strength of nuclear materials. Because of the computational expense, the INL has incorporated new hardware from the commercial graphics community.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using fingerprint authentication to reduce system security: An empirical study

Security and Privacy (SP), 2011 …, Jan 1, 2011

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Adding a Biometric Authenticator to Reduce System Security: An Empirical Study

Abstract Choosing the security architecture and policies for a system is a demanding task that mu... more Abstract Choosing the security architecture and policies for a system is a demanding task that must be informed by an understanding of user behaviors. We investigate the hypothesis that adding visible security features to a system increases user confidence in the security of a system and thus causes users to behave less securely overall. In our study, we had 94 volunteers each create a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Potential Reductions in Overall System Security Caused by Using Fingerprint Authentication

ABSTRACT Choosing the security architecture and policies for a system is a demanding task that mu... more ABSTRACT Choosing the security architecture and policies for a system is a demanding task that must be informed by an understanding of user behaviors. Through a user study, I investigate the hypothesis that adding visible security features to a system increases user confidence in the security of a system and thus causes users to behave less securely overall. In the study, 94 volunteers each created a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using GPU Programming for Inverse Spectroscopy

Abstract: The Idaho National Laboratory (INL) has developed a detector that relies heavily on com... more Abstract: The Idaho National Laboratory (INL) has developed a detector that relies heavily on computationally expensive inverse spectroscopy algorithms to determine probabilistic three dimensional mappings of the source and its intensity. This inverse spectroscopy algorithm applies to material accountability by determining the location and strength of nuclear materials. Because of the computational expense, the INL has incorporated new hardware from the commercial graphics community.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using fingerprint authentication to reduce system security: An empirical study

Security and Privacy (SP), 2011 …, Jan 1, 2011

Bookmarks Related papers MentionsView impact

Log In