An efficient user verification system via mouse movements
N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …
User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
N Gunson, D Marshall, H Morton, M Jack - Computers & Security, 2011 - Elsevier
This paper describes an experiment to investigate user perceptions of the usability and
security of single-factor and two-factor authentication methods in automated telephone …
security of single-factor and two-factor authentication methods in automated telephone …
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …
password scheme, including usability and security evaluations, and implementation …
oPass: A user authentication protocol resistant to password stealing and password reuse attacks
Text password is the most popular form of user authentication on websites due to its
convenience and simplicity. However, users' passwords are prone to be stolen and …
convenience and simplicity. However, users' passwords are prone to be stolen and …
User study, analysis, and usable security of passwords based on digital objects
Despite all efforts, password schemes intended to deploy or encourage the use of strong
passwords have largely failed. As an alternative to enable users to create, maintain, and use …
passwords have largely failed. As an alternative to enable users to create, maintain, and use …
A secure recognition based graphical password by watermarking
AH Lashkari, AA Manaf… - 2011 IEEE 11th …, 2011 - ieeexplore.ieee.org
One of the most important topics in information security today is user authentication. There is
a good security when using the text-based strong password schemes but often memorizing …
a good security when using the text-based strong password schemes but often memorizing …
Token-based graphical password authentication
JC Gyorffy, AF Tappenden, J Miller - International Journal of Information …, 2011 - Springer
Given that phishing is an ever-increasing problem, a better authentication system is
required. We propose a system that uses a graphical password deployed from a Trojan and …
required. We propose a system that uses a graphical password deployed from a Trojan and …
[PDF][PDF] Comparing the proof by knowledge authentication techniques
S Gkarafli, AA Economides - International Journal of Computer …, 2011 - conta.uom.gr
This paper presents a survey of proof by knowledge authentication techniques (text
passwords, visual passwords and graphical passwords). Both new methods are more …
passwords, visual passwords and graphical passwords). Both new methods are more …
[PDF][PDF] Automated attacks on pass Point-Style graphical passwords
KD Kumar - Journal of Computer Applications (JCA), 2011 - jcaksrce.org
Users click on one point per image for a sequence of images, the next image is based on the
previous click-point. Users preferred Cued Click Points (CCP) to Pass Points selecting and …
previous click-point. Users preferred Cued Click Points (CCP) to Pass Points selecting and …
[PDF][PDF] Do houses have faces?: the effect of image type in recognition-based graphical passwords
M Hlywa - 2011 - repository.library.carleton.ca
Graphical passwords are a novel method of knowledge-based authentication that show
promise for improved usability and memorability. This study examined the effect of image …
promise for improved usability and memorability. This study examined the effect of image …