Multiple password interference in text passwords and click-based graphical passwords

S Chiasson, A Forget, E Stobert… - Proceedings of the 16th …, 2009 - dl.acm.org
The underlying issues relating to the usability and security of multiple passwords are largely
unexplored. However, we know that people generally have difficulty remembering multiple …

User interface design affects security: Patterns in click-based graphical passwords

S Chiasson, A Forget, R Biddle… - International Journal of …, 2009 - Springer
Abstract Design of the user interface for authentication systems influences users and may
encourage either secure or insecure behaviour. Using data from four different but closely …

Towards usable solutions to graphical password hotspot problem

K Bicakci, NB Atalay, M Yuceel… - 2009 33rd Annual …, 2009 - ieeexplore.ieee.org
Click based graphical passwords that use background images suffer from hot-spot problem.
Previous graphical password schemes based on recognition of images do not have a …

[PDF][PDF] Usable authentication and click-based graphical passwords

S Chiasson - 2009 - repository.library.carleton.ca
" Humans are incapable of securely storing high-quality cryptographic keys, and they have
unacceptable speed and accuracy when performing cryptographic operations.(They are …

[PDF][PDF] Graphical passwords: Learning from the first generation

R Biddle, S Chiasson… - Ottawa, Canada: School of …, 2009 - hotsoft.carleton.ca
Numerous graphical password schemes have recently been proposed as alternatives to
traditional text password authentication. We provide a comprehensive overview of published …

Graphical passwords as browser extension: Implementation and usability study

K Bicakci, M Yuceel, B Erdeniz, H Gurbaslar… - … Conference on Trust …, 2009 - Springer
Today, most Internet applications still establish user authentication with traditional text based
passwords. Designing a secure as well as a user-friendly password-based method has …

The dorothy project: An open botnet analysis framework for automatic tracking and activity visualization

M Cremonini, M Riccardi - 2009 European Conference on …, 2009 - ieeexplore.ieee.org
Botnets, networks of compromised machines remotely controlled and instructed to work in a
coordinated fashion, have had an epidemic diffusion over the Internet and represent one of …

Click to zoom-inside graphical authentication

V Kumar, MK Gupta, A Chaturvedi… - … on Digital Image …, 2009 - ieeexplore.ieee.org
We propose and evaluate the usability and security of Click to Zoom-inside (CTZ); a new
graphical password authentication mechanism. Users have to click six times on one point in …

[PDF][PDF] Secure passwords through enhanced hashing

B Strahs - 2009 - Citeseer
Passwords play a critical role in online authentication. Unfortunately, passwords suffer from
two seemingly intractable problems: password cracking and password theft. In this paper …

The Impact of Image Choices on the Usability and Security of Click Based Graphical Passwords

X Suo, Y Zhu, GS Owen - Advances in Visual Computing: 5th International …, 2009 - Springer
Click based graphical password systems, such as PassPoint [1], have received much
attention in recent years. In this paper we describe our recent user studies on click based …