Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   5  
      Computer ScienceImage ProcessingNetwork SecuritySecurity
    • by 
    •   11  
      Computer ScienceHuman Computer InteractionInformation TechnologyInformation Security
    • by 
    • Graphical Passwords
    • by 
    •   3  
      Access ControlGraphical PasswordsIT Security
In this article we present the development of a new, web-based, graphical authentication mechanism called ImagePass. The authentication mechanism introduces a novel feature based on one-time passwords that increases the security of the... more
    • by 
    •   3  
      Usable Security (Computer Security)Graphical PasswordsGraphical Password Authentication
Getting users to abandon text-based passwords has been a rather difficult task. Several alternatives to textual passwords have been proposed including authentication based on images. Research shows that graphical authentication mechanisms... more
    • by 
    •   3  
      Usable Security (Computer Security)Graphical PasswordsGraphical Password Authentication
    • by 
    •   3  
      Graphical PasswordsGraphical Password AuthenticationPicture Password
Researchers have developed various graphical authentication mechanisms, with varied results in different environments. However, it has been difficult to get users to abandon traditional text-passwords in favor of something unfamiliar,... more
    • by 
    •   3  
      Usable Security (Computer Security)Graphical PasswordsGraphical Password Authentication
Existing graphical authentication methods take into account the fact that users are more capable of remembering pictures instead of text. Graphical authentication schemes are expected to be less vulnerable to specific hacker attack... more
    • by 
    •   4  
      Graphical PasswordsMobile Device AuthenticationGraphical mobile authenticationweb color graphical authentication
    • by 
    •   3  
      GestureGraphical PasswordsHotspots
    • by 
    •   3  
      SecurityGraphical PasswordsText-based passwords
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (PIN). These users frequently have many different PINs, and fail... more
    • by 
    •   3  
      Usable Security (Computer Security)HCIGraphical Passwords
The password the almost universal authentication solution yet is buckling under the strain. It demonstrates insufficiency and weakness due to poor choice, reuse and ease of transfer. Graphical passwords, biometrics, and hardware tokens... more
    • by 
    •   8  
      UsabilityAuthenticationCybersecurityGraphical Passwords
As users can only make informed choices when the proposals being discussed are meaningful to them, enabling users to envision and make sense of those proposals is an essential element of all approaches to system design. The focus of this... more
    • by 
    •   3  
      Usable Security (Computer Security)Graphical PasswordsGraphical Password Authentication
Abstract—Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or by recording the authentication session. Due to the visual interface, this problem has become exacerbated in graphical passwords.... more
    • by 
    •   3  
      AuthenticationGraphical PasswordsShoulder surfing
In this article we present the development of a new, web-based, graphical authentication mechanism called ImagePass. The authentication mechanism introduces a novel feature based on one-time passwords that increases the security of the... more
    • by 
    •   15  
      Information SystemsCognitive ScienceUsable Security (Computer Security)System Design
    • by 
    •   5  
      Information SecuritySecurityComputer SecurityGraphical Passwords
    • by 
    •   3  
      Usable Security (Computer Security)Graphical PasswordsGraphical Password Authentication
This research examined factors which affected password creation using images on a grid. The experiment was carried out with 1,069 participants, by simulating a game of recalling pictures and using a questionnaire to gather users'... more
    • by 
    •   3  
      Graphical PasswordsGraphical Password AuthenticatioLayout Grid
    • by 
    •   16  
      Information SystemsCognitive ScienceComputer ScienceUsable Security (Computer Security)
    • by 
    •   3  
      Usable Security (Computer Security)Graphical PasswordsGraphical Password Authentication