An efficient user verification system via mouse movements

N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …

User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking

N Gunson, D Marshall, H Morton, M Jack - Computers & Security, 2011 - Elsevier
This paper describes an experiment to investigate user perceptions of the usability and
security of single-factor and two-factor authentication methods in automated telephone …

Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism

S Chiasson, E Stobert, A Forget… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …

oPass: A user authentication protocol resistant to password stealing and password reuse attacks

HM Sun, YH Chen, YH Lin - IEEE transactions on information …, 2011 - ieeexplore.ieee.org
Text password is the most popular form of user authentication on websites due to its
convenience and simplicity. However, users' passwords are prone to be stolen and …

User study, analysis, and usable security of passwords based on digital objects

R Biddle, M Mannan, PC van Oorschot… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Despite all efforts, password schemes intended to deploy or encourage the use of strong
passwords have largely failed. As an alternative to enable users to create, maintain, and use …

A secure recognition based graphical password by watermarking

AH Lashkari, AA Manaf… - 2011 IEEE 11th …, 2011 - ieeexplore.ieee.org
One of the most important topics in information security today is user authentication. There is
a good security when using the text-based strong password schemes but often memorizing …

Token-based graphical password authentication

JC Gyorffy, AF Tappenden, J Miller - International Journal of Information …, 2011 - Springer
Given that phishing is an ever-increasing problem, a better authentication system is
required. We propose a system that uses a graphical password deployed from a Trojan and …

[PDF][PDF] Comparing the proof by knowledge authentication techniques

S Gkarafli, AA Economides - International Journal of Computer …, 2011 - conta.uom.gr
This paper presents a survey of proof by knowledge authentication techniques (text
passwords, visual passwords and graphical passwords). Both new methods are more …

[PDF][PDF] Automated attacks on pass Point-Style graphical passwords

KD Kumar - Journal of Computer Applications (JCA), 2011 - jcaksrce.org
Users click on one point per image for a sequence of images, the next image is based on the
previous click-point. Users preferred Cued Click Points (CCP) to Pass Points selecting and …

[PDF][PDF] Do houses have faces?: the effect of image type in recognition-based graphical passwords

M Hlywa - 2011 - repository.library.carleton.ca
Graphical passwords are a novel method of knowledge-based authentication that show
promise for improved usability and memorability. This study examined the effect of image …