Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
Continuous and transparent multimodal authentication: reviewing the state of the art
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …
online and via various Internet-enabled digital devices. Unfortunately, these activities …
Quantifying the security of graphical passwords: The case of android unlock patterns
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …
of text-based passwords, inspired by research that shows that the graphical memory of …
[BOOK][B] Usable security: History, themes, and challenges
S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …
Human Computer Interaction with computer Security, more colloquially known as``usable …
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …
password scheme, including usability and security evaluations, and implementation …
Captcha as graphical passwords—A new security primitive based on hard AI problems
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
Towards reliable storage of 56-bit secrets in human memory
J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …
Exploring the design space of graphical passwords on smartphones
Smartphones have emerged as a likely application area for graphical passwords, because
they are easier to input on touchscreens than text passwords. Extensive research on …
they are easier to input on touchscreens than text passwords. Extensive research on …
Influences of human cognition and visual behavior on password strength during picture password composition
Visual attention, search, processing and comprehension are important cognitive tasks
during a graphical password composition activity. Aiming to shed light on whether individual …
during a graphical password composition activity. Aiming to shed light on whether individual …
Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method
One of the most popular contemporary graphical password approaches is the Pattern-Lock
authentication mechanism that comes integrated with the Android mobile operating system …
authentication mechanism that comes integrated with the Android mobile operating system …