Schwab et al., 2018 - Google Patents
Picture PassDoodle: usability studySchwab et al., 2018
- Document ID
- 6908717107792239269
- Author
- Schwab D
- ALharbi L
- Nichols O
- Yang L
- Publication year
- Publication venue
- 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService)
External Links
Snippet
Text password is the most widely used method for authentication. However, users have difficulty recalling secure passwords. Therefore, users will choose shorter, less secure passwords. Most psychologists have determined and proven that pictures can be easily …
- 238000000034 method 0 description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gao et al. | A survey on the use of graphical passwords in security. | |
Sreelatha et al. | Authentication schemes for session passwords using color and images | |
Katsini et al. | Security and usability in knowledge-based user authentication: A review | |
Kim et al. | A new shoulder-surfing resistant password for mobile environments | |
Schlöglhofer et al. | Secure and usable authentication on mobile devices | |
Anwar et al. | A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication. | |
Nizamani et al. | A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability | |
Balagani et al. | Pilot: Password and pin information leakage from obfuscated typing videos | |
Awan et al. | A taxonomy of multimedia-based graphical user authentication for green Internet of Things | |
Binbeshr et al. | Secure pin-entry method using one-time pin (OTP) | |
Suru et al. | Security and user interface usability of graphical authentication systems–A review | |
Schwab et al. | Picture PassDoodle: usability study | |
Chithra et al. | Pristine PixCaptcha as graphical password for secure eBanking using Gaussian elimination and cleaves algorithm | |
Alsaiari | Graphical one-time password authentication | |
Yesseyeva et al. | Tri-Pass: A new graphical user authentication scheme | |
Alsuhibany | A Camouflage Text‐Based Password Approach for Mobile Devices against Shoulder‐Surfing Attack | |
Gao et al. | Usability and security of the recall-based graphical password schemes | |
LIM | Multi-grid background Pass-Go | |
Rajarajan et al. | GRAMAP: Three stage graphical password authentication scheme. | |
Kim et al. | Secure and Usable Bio-Passwords based on Confidence Interval. | |
Akpulat et al. | Revisiting graphical passwords for augmenting, not replacing, text passwords | |
Pais et al. | Illusion PIN: tricking the eye to defeat shoulder surfing attack by using hybrid images | |
Princes et al. | Analysis of various authentication schemes for passwords using images to enhance network security through online services | |
Hassan et al. | Servers voice graphical authentication | |
Subramanyam et al. | A Study of Captcha Techniques and Development of SUPER Captcha for Secured Web Transactions |