In this paper, a graphical authentication system is presented which is based on a matching scheme. The user is required to match up thumbnail graphical images that belong to a variety of categories – in an order based approach. The number of images in the selection panel was varied to determine how this effects memorability. In addition, timing information was included as a means of enhancing the security level of the system. That is, the user’s mouse clicks were timed and used as part of the authentication process. This is one of the few studies that employ a proper biometric facility, namely mouse dynamics, into a graphical authentication system. Lastly, this study employees the use of the 2-D version of Fitts’ law, the Accot-Zhai streeri...
A graphical password is associate authentication system that works by having the user choose from pi...
User Authentication is a critical component in information security. Several widely used mechanisms ...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Password authentication is failing as an authentication since it increases the user burden to rememb...
One of the most important primitive security mechanisms is the authentication system. Authentication...
Nowadays, the most accepted computer authentication technique is to use alphanumerical usernames wit...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
There is increasing coverage in the literature relating to the different facets surrounding the secu...
ABSTRACT: This paper considers the effectiveness of using mouse movements as a biometric. Two authen...
Passwords are the most common form of authentication. The password memorability problem is magnified...
Authentication is probably one of the main security processes that almost everybody has at one point...
Abstract- The most common computer authentication method is to use alphanumerical usernames and pass...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
Security systems help to protect machines or sensitive data from unauthorized users. The need for be...
Authentication systems used in the security world vary greatly but one system, the textual password ...
A graphical password is associate authentication system that works by having the user choose from pi...
User Authentication is a critical component in information security. Several widely used mechanisms ...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Password authentication is failing as an authentication since it increases the user burden to rememb...
One of the most important primitive security mechanisms is the authentication system. Authentication...
Nowadays, the most accepted computer authentication technique is to use alphanumerical usernames wit...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
There is increasing coverage in the literature relating to the different facets surrounding the secu...
ABSTRACT: This paper considers the effectiveness of using mouse movements as a biometric. Two authen...
Passwords are the most common form of authentication. The password memorability problem is magnified...
Authentication is probably one of the main security processes that almost everybody has at one point...
Abstract- The most common computer authentication method is to use alphanumerical usernames and pass...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
Security systems help to protect machines or sensitive data from unauthorized users. The need for be...
Authentication systems used in the security world vary greatly but one system, the textual password ...
A graphical password is associate authentication system that works by having the user choose from pi...
User Authentication is a critical component in information security. Several widely used mechanisms ...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...