Leveraging behavioral science to mitigate cyber security risk
SL Pfleeger, DD Caputo - Computers & security, 2012 - Elsevier
Most efforts to improve cyber security focus primarily on incorporating new technological
approaches in products and processes. However, a key element of improvement involves …
approaches in products and processes. However, a key element of improvement involves …
A research agenda acknowledging the persistence of passwords
C Herley, P Van Oorschot - IEEE Security & privacy, 2011 - ieeexplore.ieee.org
Despite countless attempts and near-universal desire to replace them, passwords are more
widely used and firmly entrenched than ever. The authors' exploration leads them to argue …
widely used and firmly entrenched than ever. The authors' exploration leads them to argue …
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
M Frank, R Biedert, E Ma, I Martinovic… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
We investigate whether a classifier can continuously authenticate users based on the way
they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch …
they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch …
Passwords and the evolution of imperfect authentication
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
{It's} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception
M Harbach, E Von Zezschwitz, A Fichtner… - 10th symposium on …, 2014 - usenix.org
A lot of research is being conducted into improving the usability and security of phone-
unlocking. There is however a severe lack of scientific data on users' current unlocking …
unlocking. There is however a severe lack of scientific data on users' current unlocking …
You are how you touch: User verification on smartphones via tapping behaviors
Smartphone users have their own unique behavioral patterns when tapping on the touch
screens. These personal patterns are reflected on the different rhythm, strength, and angle …
screens. These personal patterns are reflected on the different rhythm, strength, and angle …
Quantifying the security of graphical passwords: The case of android unlock patterns
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …
of text-based passwords, inspired by research that shows that the graphical memory of …
An efficient user verification system via mouse movements
N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …
[图书][B] Usable security: History, themes, and challenges
S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …
Human Computer Interaction with computer Security, more colloquially known as``usable …