Graphical passwords: Learning from the first twelve years
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …
alternatives to text-based password authentication. We provide a comprehensive overview …
[PDF][PDF] Smudge attacks on smartphone touch screens
Touch screens are an increasingly common feature on personal computing devices,
especially smartphones, where size and user interface advantages accrue from …
especially smartphones, where size and user interface advantages accrue from …
[PDF][PDF] A framework for reasoning about the human in the loop
LF Cranor - 2008 - usenix.org
Many secure systems rely on a “human in the loop” to perform security-critical functions.
However, humans often fail in their security roles. Whenever possible, secure system …
However, humans often fail in their security roles. Whenever possible, secure system …
Graphical password authentication using cued click points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-
recall graphical password technique. Users click on one point per image for a sequence of …
recall graphical password technique. Users click on one point per image for a sequence of …
An unbiased offline evaluation of contextual bandit algorithms with generalized linear models
Contextual bandit algorithms have become popular tools in online recommendation and
advertising systems.\emphOffline evaluation of the effectiveness of new algorithms in these …
advertising systems.\emphOffline evaluation of the effectiveness of new algorithms in these …
Quantifying the security of graphical passwords: The case of android unlock patterns
Graphical passwords were proposed as an alternative to overcome the inherent limitations
of text-based passwords, inspired by research that shows that the graphical memory of …
of text-based passwords, inspired by research that shows that the graphical memory of …
[PDF][PDF] The Password Thicket: Technical and Market Failures in Human Authentication on the Web.
We report the results of the first large-scale empirical analysis of password implementations
deployed on the Internet. Our study included 150 websites which offer free user accounts for …
deployed on the Internet. Our study included 150 websites which offer free user accounts for …
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …
password scheme, including usability and security evaluations, and implementation …
Modeling user choice in the PassPoints graphical password scheme
We develop a model to identify the most likely regions for users to click in order to create
graphical passwords in the PassPoints system. A PassPoints password is a sequence of …
graphical passwords in the PassPoints system. A PassPoints password is a sequence of …
Do background images improve" draw a secret" graphical passwords?
Draw a secret (DAS) is a representative graphical password scheme. Rigorous theoretical
analysis suggests that DAS supports an overall password space larger than that of the …
analysis suggests that DAS supports an overall password space larger than that of the …