Security ceremonies: including humans in cryptographic protocols
KJ Radke - 2013 - eprints.qut.edu.au
Whether by using electronic banking, by using credit cards, or by synchronising a mobile
telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic …
telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic …
Evaluation of Passwords' Vulnerability To Shoulder Surfing Attacks
L Bošnjak - 2022 - search.proquest.com
The password security problem is one of the most critical challenges in the field of
information security. It is characterized by the increasing security deficiencies of textual …
information security. It is characterized by the increasing security deficiencies of textual …
[引用][C] Detection of DIAG and LINE patterns in PassPoints graphical passwords based on the maximum angles of their Delaunay triangles
G Sosa-Gómez, O Rojas - OPENAIRE, 2022 - NLM (Medline)
[引用][C] Weak passpoint passwords detected by the perimeter of Delaunay triangles
[PDF][PDF] Are Androids users' online security compromised by accessibility services and user interface design?
J Mason, J Smith - osf.io
When developing an online interface, striking a balance between security and usability is
important to protecting user data. Making an interface that is easy to use, accessible, and …
important to protecting user data. Making an interface that is easy to use, accessible, and …
Exploring human factors issues & possible countermeasures in password authentication
NHB Zakaria - 2013 - theses.ncl.ac.uk
This thesis is concerned with usable security. It describes a series of experiments to
understand users' behaviour in the domain of password authentication. The thesis is …
understand users' behaviour in the domain of password authentication. The thesis is …
[PDF][PDF] A Survey Analysis of Recognition-Based Graphical Password Art-form Design Attributes
AO Egwali, JB Odetayo - akamai.university
Over the current century, recognition-based graphical password models (RGPM) that embed
art-forms in their interfaces have been designed to enable users to comply with fundamental …
art-forms in their interfaces have been designed to enable users to comply with fundamental …
[PDF][PDF] Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication
SZ Nizamani, WA Sahito… - International Journal of …, 2018 - pdfs.semanticscholar.org
Knowledge based authentication schemes are divided into textual password schemes and
graphical password schemes. Textual password schemes are easy to use but have well …
graphical password schemes. Textual password schemes are easy to use but have well …
[图书][B] Security and usability in a hybrid property based graphical authentication system
HU Suru - 2018 - search.proquest.com
Alphanumeric text and PINs continue to be the dominant authentication methods in spite of
the numerous concerns by security researchers of their inability to properly address usability …
the numerous concerns by security researchers of their inability to properly address usability …
[PDF][PDF] Design of Folder Locker Application A Case Study of C#. Net Application for Windows OS'
JB Ekuewa, OO Oyetunji, AO Fabiyi - International Conference of …, 2018 - repcomseet.org
Nowadays, most of computer users are facing problem for providing the security to the
folder, so that it will not be accesses by the unauthorized user, sometimes folders are …
folder, so that it will not be accesses by the unauthorized user, sometimes folders are …