Nudges for privacy and security: Understanding and assisting users' choices online

A Acquisti, I Adjerid, R Balebako… - ACM Computing …, 2017 - dl.acm.org
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …

Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

Quantifying the security of graphical passwords: The case of android unlock patterns

S Uellenbeck, M Dürmuth, C Wolf, T Holz - Proceedings of the 2013 …, 2013 - dl.acm.org
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …

Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism

S Chiasson, E Stobert, A Forget… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …

Captcha as graphical passwords—A new security primitive based on hard AI problems

BB Zhu, J Yan, G Bao, M Yang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …

Multiple password interference in text passwords and click-based graphical passwords

S Chiasson, A Forget, E Stobert… - Proceedings of the 16th …, 2009 - dl.acm.org
The underlying issues relating to the usability and security of multiple passwords are largely
unexplored. However, we know that people generally have difficulty remembering multiple …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Improving text passwords through persuasion

A Forget, S Chiasson, PC Van Oorschot… - Proceedings of the 4th …, 2008 - dl.acm.org
Password restriction policies and advice on creating secure passwords have limited effects
on password strength. Influencing users to create more secure passwords remains an open …

Purely automated attacks on passpoints-style graphical passwords

PC Van Oorschot, A Salehi-Abari… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
We introduce and evaluate various methods for purely automated attacks against
PassPoints-style graphical passwords. For generating these attacks, we introduce a graph …

User interface design affects security: Patterns in click-based graphical passwords

S Chiasson, A Forget, R Biddle… - International Journal of …, 2009 - Springer
Abstract Design of the user interface for authentication systems influences users and may
encourage either secure or insecure behaviour. Using data from four different but closely …