Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Schwab et al., 2018 - Google Patents

Picture PassDoodle: usability study

Schwab et al., 2018

Document ID
6908717107792239269
Author
Schwab D
ALharbi L
Nichols O
Yang L
Publication year
Publication venue
2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService)

External Links

Snippet

Text password is the most widely used method for authentication. However, users have difficulty recalling secure passwords. Therefore, users will choose shorter, less secure passwords. Most psychologists have determined and proven that pictures can be easily …
Continue reading at ieeexplore.ieee.org (other versions)
  • 238000000034 method 0 description 12

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Similar Documents

Publication Publication Date Title
Gao et al. A survey on the use of graphical passwords in security.
Sreelatha et al. Authentication schemes for session passwords using color and images
Katsini et al. Security and usability in knowledge-based user authentication: A review
Kim et al. A new shoulder-surfing resistant password for mobile environments
Schlöglhofer et al. Secure and usable authentication on mobile devices
Anwar et al. A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication.
Nizamani et al. A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability
Balagani et al. Pilot: Password and pin information leakage from obfuscated typing videos
Awan et al. A taxonomy of multimedia-based graphical user authentication for green Internet of Things
Binbeshr et al. Secure pin-entry method using one-time pin (OTP)
Suru et al. Security and user interface usability of graphical authentication systems–A review
Schwab et al. Picture PassDoodle: usability study
Chithra et al. Pristine PixCaptcha as graphical password for secure eBanking using Gaussian elimination and cleaves algorithm
Alsaiari Graphical one-time password authentication
Yesseyeva et al. Tri-Pass: A new graphical user authentication scheme
Alsuhibany A Camouflage Text‐Based Password Approach for Mobile Devices against Shoulder‐Surfing Attack
Gao et al. Usability and security of the recall-based graphical password schemes
LIM Multi-grid background Pass-Go
Rajarajan et al. GRAMAP: Three stage graphical password authentication scheme.
Kim et al. Secure and Usable Bio-Passwords based on Confidence Interval.
Akpulat et al. Revisiting graphical passwords for augmenting, not replacing, text passwords
Pais et al. Illusion PIN: tricking the eye to defeat shoulder surfing attack by using hybrid images
Princes et al. Analysis of various authentication schemes for passwords using images to enhance network security through online services
Hassan et al. Servers voice graphical authentication
Subramanyam et al. A Study of Captcha Techniques and Development of SUPER Captcha for Secured Web Transactions