Security ceremonies: including humans in cryptographic protocols

KJ Radke - 2013 - eprints.qut.edu.au
Whether by using electronic banking, by using credit cards, or by synchronising a mobile
telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic …

Evaluation of Passwords' Vulnerability To Shoulder Surfing Attacks

L Bošnjak - 2022 - search.proquest.com
The password security problem is one of the most critical challenges in the field of
information security. It is characterized by the increasing security deficiencies of textual …

[引用][C] Detection of DIAG and LINE patterns in PassPoints graphical passwords based on the maximum angles of their Delaunay triangles

G Sosa-Gómez, O Rojas - OPENAIRE, 2022 - NLM (Medline)

[引用][C] Weak passpoint passwords detected by the perimeter of Delaunay triangles

O Rojas, G Sosa-Gómez, L Suárez-Plasencia… - OPENAIRE, 2022 - Hindawi Limited

[PDF][PDF] Are Androids users' online security compromised by accessibility services and user interface design?

J Mason, J Smith - osf.io
When developing an online interface, striking a balance between security and usability is
important to protecting user data. Making an interface that is easy to use, accessible, and …

Exploring human factors issues & possible countermeasures in password authentication

NHB Zakaria - 2013 - theses.ncl.ac.uk
This thesis is concerned with usable security. It describes a series of experiments to
understand users' behaviour in the domain of password authentication. The thesis is …

[PDF][PDF] A Survey Analysis of Recognition-Based Graphical Password Art-form Design Attributes

AO Egwali, JB Odetayo - akamai.university
Over the current century, recognition-based graphical password models (RGPM) that embed
art-forms in their interfaces have been designed to enable users to comply with fundamental …

[PDF][PDF] Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication

SZ Nizamani, WA Sahito… - International Journal of …, 2018 - pdfs.semanticscholar.org
Knowledge based authentication schemes are divided into textual password schemes and
graphical password schemes. Textual password schemes are easy to use but have well …

[图书][B] Security and usability in a hybrid property based graphical authentication system

HU Suru - 2018 - search.proquest.com
Alphanumeric text and PINs continue to be the dominant authentication methods in spite of
the numerous concerns by security researchers of their inability to properly address usability …

[PDF][PDF] Design of Folder Locker Application A Case Study of C#. Net Application for Windows OS'

JB Ekuewa, OO Oyetunji, AO Fabiyi - International Conference of …, 2018 - repcomseet.org
Nowadays, most of computer users are facing problem for providing the security to the
folder, so that it will not be accesses by the unauthorized user, sometimes folders are …