Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
Increasing the security of gaze-based cued-recall graphical passwords using saliency masks
With computers being used ever more ubiquitously in situations where privacy is important,
secure user authentication is a central requirement. Gaze-based graphical passwords are a …
secure user authentication is a central requirement. Gaze-based graphical passwords are a …
Guessing human-chosen secrets
J Bonneau - 2012 - cl.cam.ac.uk
Authenticating humans to computers remains a notable weak point in computer security
despite decades of effort. Although the security research community has explored dozens of …
despite decades of effort. Although the security research community has explored dozens of …
Do you see your password? Applying recognition to textual passwords
Text-based password systems are the authentication mechanism most commonly used on
computer systems. Graphical passwords have recently been proposed because the pictorial …
computer systems. Graphical passwords have recently been proposed because the pictorial …
[PDF][PDF] Ray's scheme: Graphical password based hybrid authentication system for smart hand held devices
PP Ray - J. Inf. Eng. Appl, 2012 - academia.edu
Passwords provide security mechanism for authentication and protection services against
unwanted access to resources. One promising alternatives of textual passwords is a …
unwanted access to resources. One promising alternatives of textual passwords is a …
Gamifying authentication
C Kroeze, MS Olivier - 2012 Information Security for South …, 2012 - ieeexplore.ieee.org
The fields of security and usability often conflict with each other. Security focuses on making
systems difficult for attackers to compromise. However, doing this also increases difficulty for …
systems difficult for attackers to compromise. However, doing this also increases difficulty for …
The MVP Web-Based Authentication Framework: (Short Paper)
S Chiasson, C Deschamps, E Stobert, M Hlywa… - … Cryptography and Data …, 2012 - Springer
MVP is a framework allowing websites to use diverse knowledge-based authentication
schemes. One application is its use in conducting ecologically valid user studies of …
schemes. One application is its use in conducting ecologically valid user studies of …
Exploration and field study of a password manager using icon-based passwords
We carry out a hybrid lab and field study of a password manager program, and report on
usability and security. Our study explores iPMAN, a browser-based password manager that …
usability and security. Our study explores iPMAN, a browser-based password manager that …
Multiple password interference in graphical passwords
Considerable studies verified that people are vulnerable to multiple passwords interference
in alphanumeric passwords but few studies in graphical passwords. We conducted a study …
in alphanumeric passwords but few studies in graphical passwords. We conducted a study …
Implementing Open Authentication for Web Services with a Secure Memory Card
AP Leinonen, T Tuikka, E Siira - 2012 4th International …, 2012 - ieeexplore.ieee.org
Open authentication protocols have become a standard solution to allow interfacing of third-
party applications and websites. This paper presents a rationale for the use of secure …
party applications and websites. This paper presents a rationale for the use of secure …