Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

J Bonneau, C Herley, PC Van Oorschot… - … IEEE symposium on …, 2012 - ieeexplore.ieee.org
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …

The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes

V Zimmermann, N Gerber - International Journal of Human-Computer …, 2020 - Elsevier
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …

A birthday present every eleven wallets? the security of customer-chosen banking pins

J Bonneau, S Preibusch, R Anderson - Financial Cryptography and Data …, 2012 - Springer
We provide the first published estimates of the difficulty of guessing a human-chosen 4-digit
PIN. We begin with two large sets of 4-digit sequences chosen outside banking for online …

Captcha as graphical passwords—A new security primitive based on hard AI problems

BB Zhu, J Yan, G Bao, M Yang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …

Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices

E Von Zezschwitz, P Dunphy, A De Luca - Proceedings of the 15th …, 2013 - dl.acm.org
Graphical password systems based upon the recall and reproduction of visual patterns (eg
as seen on the Google Android platform) are assumed to have desirable usability and …

Purely automated attacks on passpoints-style graphical passwords

PC Van Oorschot, A Salehi-Abari… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
We introduce and evaluate various methods for purely automated attacks against
PassPoints-style graphical passwords. For generating these attacks, we introduce a graph …

Towards reliable storage of 56-bit secrets in human memory

J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …

User interface design affects security: Patterns in click-based graphical passwords

S Chiasson, A Forget, R Biddle… - International Journal of …, 2009 - Springer
Abstract Design of the user interface for authentication systems influences users and may
encourage either secure or insecure behaviour. Using data from four different but closely …

Exploiting predictability in click-based graphical passwords

PC van Oorschot, J Thorpe - Journal of Computer Security, 2011 - content.iospress.com
We provide an in-depth study of the security of click-based graphical password schemes like
PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and …