Graphical Passwords--A Discussion
AVDM Kayem - 2016 30th International Conference on …, 2016 - ieeexplore.ieee.org
Authentications, on web applications and service platforms such as the ones that enable
collaborative information sharing and resource management, are typically handled via text …
collaborative information sharing and resource management, are typically handled via text …
Sweet-spotting security and usability for intelligent graphical authentication mechanisms
This paper investigates the trade-off between security and usability in recognition-based
graphical authentication mechanisms. Through a user study (N= 103) based on a real usage …
graphical authentication mechanisms. Through a user study (N= 103) based on a real usage …
[PDF][PDF] A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication.
Mobile devices such as smartphones and tablets are widely used to perform security critical
and privacy sensitive activities, such as mobile banking, mobile health care, mobile …
and privacy sensitive activities, such as mobile banking, mobile health care, mobile …
[PDF][PDF] Usable authentication and click-based graphical passwords
S Chiasson - 2009 - repository.library.carleton.ca
" Humans are incapable of securely storing high-quality cryptographic keys, and they have
unacceptable speed and accuracy when performing cryptographic operations.(They are …
unacceptable speed and accuracy when performing cryptographic operations.(They are …
[PDF][PDF] A world with many authentication schemes
A Forget - 2013 - repository.library.carleton.ca
Usability and security challenges with standard text passwords have led researchers and
professionals to consider alternative authentication schemes. This thesis explores the …
professionals to consider alternative authentication schemes. This thesis explores the …
[图书][B] Human-centred web adaptation and personalization
P Germanakos, M Belk - 2016 - Springer
The rapid evolution of heterogeneous and ubiquitous technologies in recent years, along
with the growing demand for automation of services and content delivery, generated a …
with the growing demand for automation of services and content delivery, generated a …
[HTML][HTML] Why Does Privacy Paradox Exist?: A Qualitative Inquiry to Understand the Reasons for Privacy Paradox Among Smartphone Users
S Chhabra - Journal of Electronic Commerce in Organizations …, 2022 - igi-global.com
In this exploratory study, the main aim was to find,'why do people disclose information when
they are concerned about their privacy?'. The reasons that provide a plausible explanation …
they are concerned about their privacy?'. The reasons that provide a plausible explanation …
[PDF][PDF] Graphical passwords: Learning from the first generation
R Biddle, S Chiasson… - Ottawa, Canada: School of …, 2009 - hotsoft.carleton.ca
Numerous graphical password schemes have recently been proposed as alternatives to
traditional text password authentication. We provide a comprehensive overview of published …
traditional text password authentication. We provide a comprehensive overview of published …
[PDF][PDF] Security in graphical authentication
RG Rittenhouse, JA Chaudry, M Lee - International Journal of …, 2013 - researchgate.net
Abstract Graphical Authentication Systems are a potential replacement or supplement for
conventional authentication systems. Several studies have suggested graphical …
conventional authentication systems. Several studies have suggested graphical …
Geographical security questions for fallback authentication
A Addas, A Salehi-Abari… - 2019 17th international …, 2019 - ieeexplore.ieee.org
Fallback authentication is the backup authentication method used when the primary
authentication method (eg, passwords, biometrics, etc.) fails. Currently, widely-deployed …
authentication method (eg, passwords, biometrics, etc.) fails. Currently, widely-deployed …