Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

Increasing the security of gaze-based cued-recall graphical passwords using saliency masks

A Bulling, F Alt, A Schmidt - Proceedings of the SIGCHI conference on …, 2012 - dl.acm.org
With computers being used ever more ubiquitously in situations where privacy is important,
secure user authentication is a central requirement. Gaze-based graphical passwords are a …

Guessing human-chosen secrets

J Bonneau - 2012 - cl.cam.ac.uk
Authenticating humans to computers remains a notable weak point in computer security
despite decades of effort. Although the security research community has explored dozens of …

Do you see your password? Applying recognition to textual passwords

N Wright, AS Patrick, R Biddle - … of the Eighth Symposium on Usable …, 2012 - dl.acm.org
Text-based password systems are the authentication mechanism most commonly used on
computer systems. Graphical passwords have recently been proposed because the pictorial …

[PDF][PDF] Ray's scheme: Graphical password based hybrid authentication system for smart hand held devices

PP Ray - J. Inf. Eng. Appl, 2012 - academia.edu
Passwords provide security mechanism for authentication and protection services against
unwanted access to resources. One promising alternatives of textual passwords is a …

Gamifying authentication

C Kroeze, MS Olivier - 2012 Information Security for South …, 2012 - ieeexplore.ieee.org
The fields of security and usability often conflict with each other. Security focuses on making
systems difficult for attackers to compromise. However, doing this also increases difficulty for …

The MVP Web-Based Authentication Framework: (Short Paper)

S Chiasson, C Deschamps, E Stobert, M Hlywa… - … Cryptography and Data …, 2012 - Springer
MVP is a framework allowing websites to use diverse knowledge-based authentication
schemes. One application is its use in conducting ecologically valid user studies of …

Exploration and field study of a password manager using icon-based passwords

K Bicakci, NB Atalay, M Yuceel… - … Cryptography and Data …, 2012 - Springer
We carry out a hybrid lab and field study of a password manager program, and report on
usability and security. Our study explores iPMAN, a browser-based password manager that …

Multiple password interference in graphical passwords

H Gao, L Ma, W Jia, F Ye - International Journal of …, 2012 - inderscienceonline.com
Considerable studies verified that people are vulnerable to multiple passwords interference
in alphanumeric passwords but few studies in graphical passwords. We conducted a study …

Implementing Open Authentication for Web Services with a Secure Memory Card

AP Leinonen, T Tuikka, E Siira - 2012 4th International …, 2012 - ieeexplore.ieee.org
Open authentication protocols have become a standard solution to allow interfacing of third-
party applications and websites. This paper presents a rationale for the use of secure …