Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

Continuous and transparent multimodal authentication: reviewing the state of the art

A Al Abdulwahid, N Clarke, I Stengel, S Furnell… - Cluster …, 2016 - Springer
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …

Quantifying the security of graphical passwords: The case of android unlock patterns

S Uellenbeck, M Dürmuth, C Wolf, T Holz - Proceedings of the 2013 …, 2013 - dl.acm.org
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …

[BOOK][B] Usable security: History, themes, and challenges

S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …

Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism

S Chiasson, E Stobert, A Forget… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …

Captcha as graphical passwords—A new security primitive based on hard AI problems

BB Zhu, J Yan, G Bao, M Yang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …

Towards reliable storage of 56-bit secrets in human memory

J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …

Exploring the design space of graphical passwords on smartphones

F Schaub, M Walch, B Könings, M Weber - Proceedings of the Ninth …, 2013 - dl.acm.org
Smartphones have emerged as a likely application area for graphical passwords, because
they are easier to input on touchscreens than text passwords. Extensive research on …

Influences of human cognition and visual behavior on password strength during picture password composition

C Katsini, C Fidas, GE Raptis, M Belk… - Proceedings of the …, 2018 - dl.acm.org
Visual attention, search, processing and comprehension are important cognitive tasks
during a graphical password composition activity. Aiming to shed light on whether individual …

Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method

P Andriotis, T Tryfonas, G Oikonomou - … , HAS 2014, Held as Part of HCI …, 2014 - Springer
One of the most popular contemporary graphical password approaches is the Pattern-Lock
authentication mechanism that comes integrated with the Android mobile operating system …