Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
Two birds with one stone: Two-factor authentication with security beyond conventional bound
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …
authentication has been a subject of intensive research in the past two decades, and …
Graphical password authentication using cued click points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-
recall graphical password technique. Users click on one point per image for a sequence of …
recall graphical password technique. Users click on one point per image for a sequence of …
Reducing shoulder-surfing by using gaze-based password entry
Shoulder-surfing--using direct observation techniques, such as looking over someone's
shoulder, to get passwords, PINs and other sensitive personal information--is a problem that …
shoulder, to get passwords, PINs and other sensitive personal information--is a problem that …
Quantifying the security of graphical passwords: The case of android unlock patterns
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …
of text-based passwords, inspired by research that shows that the graphical memory of …
The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
[PDF][PDF] A Usability Study and Critique of Two Password Managers.
We present a usability study of two recent password manager proposals: PwdHash (Ross et
al., 2005) and Password Multiplier (Halderman et al., 2005). Both papers considered …
al., 2005) and Password Multiplier (Halderman et al., 2005). Both papers considered …
[PDF][PDF] The Password Thicket: Technical and Market Failures in Human Authentication on the Web.
We report the results of the first large-scale empirical analysis of password implementations
deployed on the Internet. Our study included 150 websites which offer free user accounts for …
deployed on the Internet. Our study included 150 websites which offer free user accounts for …
Captcha as graphical passwords—A new security primitive based on hard AI problems
Many security primitives are based on hard mathematical problems. Using hard AI problems
for security is emerging as an exciting new paradigm, but has been under-explored. In this …
for security is emerging as an exciting new paradigm, but has been under-explored. In this …