Graphical Passwords--A Discussion

AVDM Kayem - 2016 30th International Conference on …, 2016 - ieeexplore.ieee.org
Authentications, on web applications and service platforms such as the ones that enable
collaborative information sharing and resource management, are typically handled via text …

Sweet-spotting security and usability for intelligent graphical authentication mechanisms

M Belk, A Pamboris, C Fidas, C Katsini… - Proceedings of the …, 2017 - dl.acm.org
This paper investigates the trade-off between security and usability in recognition-based
graphical authentication mechanisms. Through a user study (N= 103) based on a real usage …

[PDF][PDF] A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication.

M Anwar, A Imran - MAICS, 2015 - cslab.valpo.edu
Mobile devices such as smartphones and tablets are widely used to perform security critical
and privacy sensitive activities, such as mobile banking, mobile health care, mobile …

[PDF][PDF] Usable authentication and click-based graphical passwords

S Chiasson - 2009 - repository.library.carleton.ca
" Humans are incapable of securely storing high-quality cryptographic keys, and they have
unacceptable speed and accuracy when performing cryptographic operations.(They are …

[PDF][PDF] A world with many authentication schemes

A Forget - 2013 - repository.library.carleton.ca
Usability and security challenges with standard text passwords have led researchers and
professionals to consider alternative authentication schemes. This thesis explores the …

[图书][B] Human-centred web adaptation and personalization

P Germanakos, M Belk - 2016 - Springer
The rapid evolution of heterogeneous and ubiquitous technologies in recent years, along
with the growing demand for automation of services and content delivery, generated a …

[HTML][HTML] Why Does Privacy Paradox Exist?: A Qualitative Inquiry to Understand the Reasons for Privacy Paradox Among Smartphone Users

S Chhabra - Journal of Electronic Commerce in Organizations …, 2022 - igi-global.com
In this exploratory study, the main aim was to find,'why do people disclose information when
they are concerned about their privacy?'. The reasons that provide a plausible explanation …

[PDF][PDF] Graphical passwords: Learning from the first generation

R Biddle, S Chiasson… - Ottawa, Canada: School of …, 2009 - hotsoft.carleton.ca
Numerous graphical password schemes have recently been proposed as alternatives to
traditional text password authentication. We provide a comprehensive overview of published …

[PDF][PDF] Security in graphical authentication

RG Rittenhouse, JA Chaudry, M Lee - International Journal of …, 2013 - researchgate.net
Abstract Graphical Authentication Systems are a potential replacement or supplement for
conventional authentication systems. Several studies have suggested graphical …

Geographical security questions for fallback authentication

A Addas, A Salehi-Abari… - 2019 17th international …, 2019 - ieeexplore.ieee.org
Fallback authentication is the backup authentication method used when the primary
authentication method (eg, passwords, biometrics, etc.) fails. Currently, widely-deployed …