[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Al-Ameen et al., 2022 - Google Patents

On improving the memorability of system-assigned recognition-based passwords

Al-Ameen et al., 2022

View PDF
Document ID
40800041687146534
Author
Al-Ameen M
Marne S
Fatema K
Wright M
Scielzo S
Publication year
Publication venue
Behaviour & Information Technology

External Links

Snippet

User-chosen passwords reflecting common strategies and patterns ease memorisation but offer uncertain and often weak security, while system-assigned passwords provide higher security guarantee but suffer from poor memorability. We thus examine the technique to …
Continue reading at digitalcommons.usu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Chen et al. Security risks and protection in online learning: A survey
Zhang et al. Improving multiple-password recall: an empirical study
Haque et al. Sustainable and efficient E-learning internet of things system through blockchain technology
Al-Ameen et al. Towards making random passwords memorable: Leveraging users' cognitive ability through multiple cues
Al-Ameen et al. On improving the memorability of system-assigned recognition-based passwords
Mathis et al. Prototyping usable privacy and security systems: Insights from experts
Forget A world with many authentication schemes
Ullah et al. Evaluating security and usability of profile based challenge questions authentication in online examinations
Zolait et al. User awareness of social media security: The public sector framework
Romansky et al. Business virtual system in the context of e‐governance: Investigation of secure access to information resources
Cavus et al. Examining user verification schemes, safety and secrecy issues affecting m-banking: Systematic literature review
Awan et al. A taxonomy of multimedia-based graphical user authentication for green Internet of Things
Suru et al. Security and user interface usability of graphical authentication systems–A review
Al-Ameen et al. Leveraging real-life facts to make random passwords more memorable
Meng et al. TMGMap: designing touch movement-based geographical password authentication on smartphones
Al-Ameen et al. Exploring the potential of geopass: A geographic location-password scheme
Panda et al. SGP: a safe graphical password system resisting shoulder-surfing attack on smartphones
Ciampa A comparison of user preferences for browser password managers
Bostan et al. Shoulder surfing resistant graphical password schema: Randomized Pass Points (RPP)
Doerfler Something You Have and Someone You {Know—Designing} for Interpersonal Security
Alsaiari Graphical one-time password authentication
Ciampa et al. Online versus local password management applications: An analysis of user training and reactions
Arinde et al. A preliminary investigation of authentication of choice in health-related mobile applications
Shiaeles Grablok: A novel graphical password authentication utilising blockchain technology
Sadaghiani-Tabrizi Integrating Cybersecurity Education in K-6 Curriculum: Schoolteachers, IT Experts, and Parents' Perceptions