Authentication Technologies for the Blind or Visually Impaired
Current research on \"Usable Security\" is still in its infancy and usable security solutions are often designed without paying attention to human disabilities. This paper helps to fill this void in the realm of blind computer users. More specifically, the authors discuss research challenges they are faced with and the directions they can take towards developing authentication technologies suitable for the blind or visually impaired. Their focus is on two technologies: user authentication, i.e., how a blind user can securely authenticate to a device (remote or otherwise) and device authentication, i.e., how a blind user can securely establish private and authenticated communication between two wireless devices.