Refine
Departments, institutes and facilities
- Fachbereich Informatik (38)
- Fachbereich Ingenieurwissenschaften und Kommunikation (21)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (17)
- Fachbereich Wirtschaftswissenschaften (15)
- Institut für Verbraucherinformatik (IVI) (14)
- Institut für Cyber Security & Privacy (ICSP) (13)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (8)
- Fachbereich Sozialpolitik und Soziale Sicherung (5)
- Institute of Visual Computing (IVC) (4)
- Zentrum für Innovation und Entwicklung in der Lehre (ZIEL) (3)
Document Type
- Conference Object (112) (remove)
Year of publication
- 2021 (112) (remove)
Keywords
- Augmented Reality (3)
- Big Data Analysis (2)
- Cognitive robot control (2)
- Explainable robotics (2)
- Ghana (2)
- Institutions (2)
- Learning from experience (2)
- Usable Privacy (2)
- Usable Security (2)
- design (2)
- resources (2)
- AES (1)
- AR design (1)
- AR development (1)
- AR/VR (1)
- Active Eco-Tourism in Emerging Tourism (1)
- Adoption (1)
- Advances in Design Science Research (1)
- Africa (1)
- Air transport (1)
- Applications in Energy Transport (1)
- Appropriation (1)
- Architecture (1)
- Assistive robots (1)
- Authentication features (1)
- Automatic Differentiation (1)
- Bayesian Hierarchical Model (1)
- Benchmarking (1)
- Block cipher (1)
- Branch and cut (1)
- Cache line fingerprinting (1)
- Cognitive robotics (1)
- Complex Systems Modeling and Simulation (1)
- Compliant fingers (1)
- Computational fluid dynamics (1)
- Computing methodologies (1)
- Connected Car (1)
- Consumer Informatics (1)
- Continual robot learning (1)
- Correlative Microscopy (1)
- Cortex-M3 (1)
- Culinary Tourism (1)
- Curriculum (1)
- DC-DC converter (1)
- DPA (1)
- Data Integration (1)
- Data literacy (1)
- Data visualization (1)
- Design (1)
- Design Probe (1)
- Design Recommendations (1)
- Design Theory and Practice (1)
- Differential analysis (1)
- Digital Receipt (1)
- Digital design (1)
- Digitalisierung & Internationalisierung (1)
- Digitalisierungsstrategie (1)
- Domestic Technology (1)
- E-Health (1)
- Eco-Cycling (1)
- Eco-system (1)
- Efficiency (1)
- Employee data protection (1)
- Engaging Experience (1)
- Entrepreneurship (1)
- Explainable Machine Learning (1)
- Fault Detection & Diagnosis (1)
- Feature extraction (1)
- Field Programmable Gate Array (FPGA) (1)
- Flow control (1)
- Food (1)
- Food Practices (1)
- Food Retail (1)
- GDPR (1)
- Generative Models (1)
- Grid-forming converters (1)
- Guidelines (1)
- H-BRS (1)
- HTTP (1)
- Header whitelisting (1)
- High Power Density Systems (1)
- Hochschule Bonn-Rhein-Sieg (1)
- Hospitality entrepreneurial skills (1)
- Human centered computing (1)
- Hyperspectral image (1)
- Inductive Logic Programming (1)
- Integer programming (1)
- Integrated Household Information System (1)
- Integration Platform as a Service (1)
- Interactive Artifacts (1)
- Intermediaries (1)
- Internationalization (1)
- IoT (1)
- Kenya (1)
- Lattice Boltzmann Method (1)
- Learning analytics (1)
- Liberalization (1)
- LoRa (1)
- LoRaWAN (1)
- Low-Power Wide Area Network (LP-WAN) (1)
- MR (1)
- Machine Learning (1)
- Machine-learning (1)
- Measurement (1)
- Medium Voltage (1)
- Memory-Constrained Devices (1)
- Microarchitectural Data Sampling (MDS) (1)
- Microgrid (1)
- Mixed (1)
- Mixed Reality (1)
- Mixed-methods (1)
- Mountain Biking (1)
- Multi-level converters (1)
- Multimodal Microspectroscopy (1)
- Multimodal Mobility (1)
- NISTPQC (1)
- Non-linear systems (1)
- OER (1)
- Object detection (1)
- Open Educational Resources (1)
- PDSTSP (1)
- PHR (1)
- Parallel drone scheduling traveling salesman problem (1)
- Password (1)
- Path Loss (1)
- Personal Health Record (1)
- Post-Quantum Signatures (1)
- Power Supply (1)
- Practice Theory (1)
- Privacy Awareness (1)
- Privacy engineering (1)
- Public Transport (1)
- Pulse Width Modulation (PWM) (1)
- Pytorch (1)
- QoS (1)
- Qualitative Study (1)
- Quality control (1)
- Quality diversity (1)
- Recommender Systems (1)
- Reflectance modeling (1)
- Registration Refinement (1)
- Remote lab (1)
- Repeat Purchase Recommendations (1)
- Risk Perception (1)
- Risk-based Authentication (1)
- Risk-based Authentication (RBA) (1)
- Robot failure diagnosis (1)
- Robot learning (1)
- Robot software (1)
- Robotics (1)
- Robotics competitions (1)
- Robust grasping (1)
- SAML (1)
- SCP (1)
- SIMO (1)
- SOAP (1)
- Scan and Go (1)
- Self-checkout (1)
- Self-service (1)
- Semantic gap (1)
- Separation algorithm (1)
- Shopping Experience (1)
- SiC (1)
- Side channel attack (1)
- Signature Verification (1)
- Silicon Carbide (SiC) (1)
- Slippage detection (1)
- Smart Home (1)
- Soft Switching (1)
- Soft skill (1)
- Software as a Service (1)
- Start-ups (1)
- Strategy (1)
- Streaming (1)
- Sustainability (1)
- Tourism education (1)
- Unidirectional thermoplastic composites (1)
- Urban (1)
- Usable Security and Privacy (1)
- User Interface Design (1)
- User Requirements (1)
- Variational Autoencoder (1)
- Visual Arts (1)
- Visualization design and evaluation methods (1)
- Visualization systems and tools (1)
- Voice Assistants (1)
- Web (1)
- Well-being (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- XR (1)
- ZombieLoad (1)
- advanced applications (1)
- antenna array correlation (1)
- app (1)
- authoring tools (1)
- case study (1)
- channel sounding (1)
- cityplanning (1)
- co-design (1)
- component based (1)
- consumer informatics (1)
- critical consumerism (1)
- cultural diversity (1)
- data literacy (1)
- data science (1)
- data science canvas (1)
- design science research (1)
- digital images (1)
- digitale internationale Kooperation (1)
- e-learning (1)
- emerging markets (1)
- ethics (1)
- evaluation (1)
- higher education (1)
- input-series output-parallel (1)
- instructional supervisor (1)
- interdisciplinary virtual exchange (1)
- largescale parameter (1)
- mMIMO (1)
- mathematical chemistry (1)
- measurements (1)
- modeling of complex systems (1)
- multi robot systems (1)
- multi-disciplinary approach (1)
- network (1)
- neural networks (1)
- observational data and simulations (1)
- performance and training (1)
- practitioners (1)
- property-based testing for robots (1)
- quiz formats (1)
- quizzes (1)
- recommender systems (1)
- security (1)
- simulation-based robot testing (1)
- sustainability (1)
- technology (1)
- transaction costs (1)
- verification and validation of robot action execution (1)
- virtuelle und hybride Mobilität (1)
Risk-based authentication (RBA) extends authentication mechanisms to make them more robust against account takeover attacks, such as those using stolen passwords. RBA is recommended by NIST and NCSC to strengthen password-based authentication, and is already used by major online services. Also, users consider RBA to be more usable than two-factor authentication and just as secure. However, users currently obtain RBA's high security and usability benefits at the cost of exposing potentially sensitive personal data (e.g., IP address or browser information). This conflicts with user privacy and requires to consider user rights regarding the processing of personal data. We outline potential privacy challenges regarding different attacker models and propose improvements to balance privacy in RBA systems. To estimate the properties of the privacy-preserving RBA enhancements in practical environments, we evaluated a subset of them with long-term data from 780 users of a real-world online service. Our results show the potential to increase privacy in RBA solutions. However, it is limited to certain parameters that should guide RBA design to protect privacy. We outline research directions that need to be considered to achieve a widespread adoption of privacy preserving RBA with high user acceptance.
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users. To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
Execution monitoring is essential for robots to detect and respond to failures. Since it is impossible to enumerate all failures for a given task, we learn from successful executions of the task to detect visual anomalies during runtime. Our method learns to predict the motions that occur during the nominal execution of a task, including camera and robot body motion. A probabilistic U-Net architecture is used to learn to predict optical flow, and the robot's kinematics and 3D model are used to model camera and body motion. The errors between the observed and predicted motion are used to calculate an anomaly score. We evaluate our method on a dataset of a robot placing a book on a shelf, which includes anomalies such as falling books, camera occlusions, and robot disturbances. We find that modeling camera and body motion, in addition to the learning-based optical flow prediction, results in an improvement of the area under the receiver operating characteristic curve from 0.752 to 0.804, and the area under the precision-recall curve from 0.467 to 0.549.