Recognition-based graphical authentication systems rely on the recognition of authenticator images by legitimate users for authentication. This paper presents the results of a study that compared doodle images and Mikon images as authenticators in recognition based graphical authentication systems taking various usability dimensions into account. The results of the usability evaluation, with 20 participants, demonstrated that users preferred Mikon to doodle images as authenticators in recognition based graphical authentication mechanisms. Furthermore, participants found it difficult to recognize doodle images during authentication as well as associate them with something meaningful. Our findings also show the need to consider t...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...
In this paper, a graphical authentication system is presented which is based on a matching scheme. T...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Recognition-based graphical authentication systems rely on the recognition of authenticator images b...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been pro...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
One claimed advantage of the image passwords used in recognition based graphical authentication sy...
Passwords authentication has become a widely recognized element of computer security for confirming ...
This paper presents a user study with 70 participants using four different image types: Mikon; doodl...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
This thesis investigates the usability and security of recognition-based graphical authentication sc...
Recognition-based visual authentication schemes use a variety of different kinds of images. These ...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...
In this paper, a graphical authentication system is presented which is based on a matching scheme. T...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Recognition-based graphical authentication systems rely on the recognition of authenticator images b...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been pro...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
One claimed advantage of the image passwords used in recognition based graphical authentication sy...
Passwords authentication has become a widely recognized element of computer security for confirming ...
This paper presents a user study with 70 participants using four different image types: Mikon; doodl...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
This thesis investigates the usability and security of recognition-based graphical authentication sc...
Recognition-based visual authentication schemes use a variety of different kinds of images. These ...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...
In this paper, a graphical authentication system is presented which is based on a matching scheme. T...
User Authentication is a critical component in information security. Several widely used mechanisms ...