[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Better, funner, stronger: a gameful approach to nudge people into making less predictable graphical password choices

GE Raptis, C Katsini, AJL Cen… - Proceedings of the …, 2021 - dl.acm.org
Graphical user authentication (GUA) is a common alternative to text-based user
authentication, where people are required to draw graphical passwords on background …

From hot-spots towards experience-spots: Leveraging on users' sociocultural experiences to enhance security in cued-recall graphical authentication

A Constantinides, C Fidas, M Belk, AM Pietron… - International Journal of …, 2021 - Elsevier
This paper suggests a novel cued-recall-based graphical authentication method, which
leverages on users' sociocultural experiences for improving the security and memorability of …

A taxonomy of multimedia-based graphical user authentication for green Internet of Things

KA Awan, I Ud Din, A Almogren, N Kumar… - ACM Transactions on …, 2021 - dl.acm.org
Authentication receives enormous consideration from the research community and is proven
to be an interesting field in today's era. User authentication is the major concern because …

Cross-cultural effects on graphical password memorability and design

M Mohamed, T Porterfield… - Journal of Systems and …, 2021 - emerald.com
Purpose This study aims to examine the impact of cultural familiarity with images on the
memorability of recognition-based graphical password (RBG-P). Design/methodology …

[HTML][HTML] From the quest to replace passwords towards supporting secure and usable password creation

V Zimmermann - 2021 - tuprints.ulb.tu-darmstadt.de
Authentication is an important measure for protecting personal and sensitive information
from unauthorised access. Password authentication still is the most widely used form of …

Exploring the Effect of Resolution on the Usability of Locimetric Authentication

D Delfino - HCI International 2021-Late Breaking Papers: Design …, 2021 - books.google.com
Locimetric authentication is a form of graphical authentication in which users validate their
identity by selecting predetermined points on a predetermined image. Its primary advantage …

Helping Humans and Agents Avoid Undesirable Consequences with Models of Intervention

SS Weerawardhana - 2021 - search.proquest.com
When working in an unfamiliar online environment, it can be helpful to have an observer that
can intervene and guide a user toward a desirable outcome while avoiding undesirable …

[PDF][PDF] An Authentication System For Information Security Using Cued Click Point And One Time Session Key

G Mathew, PG Scholar, K Engineerng - academia.edu
User authentication is one of the most important part of information security. Computer
security depends largely on passwords to authenticate human users. While there are …

Exploring the Effect of Resolution on the Usability of Locimetric Authentication

A Saravanos, D Zheng, S Zervoudakis… - HCI International 2021 …, 2021 - Springer
Locimetric authentication is a form of graphical authentication in which users validate their
identity by selecting predetermined points on a predetermined image. Its primary advantage …