Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
A birthday present every eleven wallets? the security of customer-chosen banking pins
We provide the first published estimates of the difficulty of guessing a human-chosen 4-digit
PIN. We begin with two large sets of 4-digit sequences chosen outside banking for online …
PIN. We begin with two large sets of 4-digit sequences chosen outside banking for online …
Captcha as graphical passwords—A new security primitive based on hard AI problems
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices
Graphical password systems based upon the recall and reproduction of visual patterns (eg
as seen on the Google Android platform) are assumed to have desirable usability and …
as seen on the Google Android platform) are assumed to have desirable usability and …
Purely automated attacks on passpoints-style graphical passwords
We introduce and evaluate various methods for purely automated attacks against
PassPoints-style graphical passwords. For generating these attacks, we introduce a graph …
PassPoints-style graphical passwords. For generating these attacks, we introduce a graph …
Towards reliable storage of 56-bit secrets in human memory
J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …
User interface design affects security: Patterns in click-based graphical passwords
Abstract Design of the user interface for authentication systems influences users and may
encourage either secure or insecure behaviour. Using data from four different but closely …
encourage either secure or insecure behaviour. Using data from four different but closely …
Exploiting predictability in click-based graphical passwords
We provide an in-depth study of the security of click-based graphical password schemes like
PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and …
PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and …