Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
An energy-efficient MAC protocol for wireless sensor networks
W Ye, J Heidemann, D Estrin - Proceedings. Twenty-first …, 2002 - ieeexplore.ieee.org
This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless
sensor networks. Wireless sensor networks use battery-operated computing and sensing …
sensor networks. Wireless sensor networks use battery-operated computing and sensing …
Encouraging users to improve password security and memorability
M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …
but rather by the limitations of human memory, and human perceptions together with their …
Quantifying the security of graphical passwords: The case of android unlock patterns
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …
of text-based passwords, inspired by research that shows that the graphical memory of …
Graphical password authentication using cued click points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-
recall graphical password technique. Users click on one point per image for a sequence of …
recall graphical password technique. Users click on one point per image for a sequence of …
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …
password scheme, including usability and security evaluations, and implementation …
Do background images improve" draw a secret" graphical passwords?
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical
analysis suggests that DAS supports an overall password space larger than that of the …
analysis suggests that DAS supports an overall password space larger than that of the …
Captcha as graphical passwords—A new security primitive based on hard AI problems
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
Casa: context-aware scalable authentication
We introduce context-aware scalable authentication (CASA) as a way of balancing security
and usability for authentication. Our core idea is to choose an appropriate form of active …
and usability for authentication. Our core idea is to choose an appropriate form of active …
Multiple password interference in text passwords and click-based graphical passwords
The underlying issues relating to the usability and security of multiple passwords are largely
unexplored. However, we know that people generally have difficulty remembering multiple …
unexplored. However, we know that people generally have difficulty remembering multiple …