Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some settings, such as for user groups with cognitive or language difficulties. Many Web-based systems have user groups with widely ranging capabilities, and more innovative authentication mechanisms should be investigated to enhance usability and accessibility while still delivering the required level of security to authorise legitimate users. This paper presents details of an authentication system which relies on the user identifying previously drawn Mikons. Mikons are self-drawn icon-like images, meant to depict a message the artist wants to convey at that point in time. These are drawn, at enrolment, using an embedded shock wave component withi...
Authentication systems used in the security world vary greatly but one system, the textual password ...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Alphanumerical usernames and passwords are the most used computer authentication technique. This app...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
Recognition-based graphical authentication systems rely on the recognition of authenticator images b...
This paper presents a user study with 70 participants using four different image types: Mikon; doodl...
This thesis contributes to the study of the usability and security of visuo-cognitive authentication...
Abstract- Access to computer systems is most often based on the use of alphanumeric passwords. Howev...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Young children routinely authenticate themselves with alphanumeric passwords, but are probably not r...
A thesis submitted to the University of Bedfordshire, in partial fulfillment of the requirements for...
Existing studies in the field of graphical authentication systems (GASs) have shown that users find ...
One of the most important topics in information security today is user authentication. User authenti...
Young children routinely authenticate themselves with alphanumeric passwords but are probably not re...
Authentication systems used in the security world vary greatly but one system, the textual password ...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Alphanumerical usernames and passwords are the most used computer authentication technique. This app...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
Recognition-based graphical authentication systems rely on the recognition of authenticator images b...
This paper presents a user study with 70 participants using four different image types: Mikon; doodl...
This thesis contributes to the study of the usability and security of visuo-cognitive authentication...
Abstract- Access to computer systems is most often based on the use of alphanumeric passwords. Howev...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Young children routinely authenticate themselves with alphanumeric passwords, but are probably not r...
A thesis submitted to the University of Bedfordshire, in partial fulfillment of the requirements for...
Existing studies in the field of graphical authentication systems (GASs) have shown that users find ...
One of the most important topics in information security today is user authentication. User authenti...
Young children routinely authenticate themselves with alphanumeric passwords but are probably not re...
Authentication systems used in the security world vary greatly but one system, the textual password ...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Alphanumerical usernames and passwords are the most used computer authentication technique. This app...