This paper presents a user study with 70 participants using four different image types: Mikon; doodle; art; object, to examine guessability of image passwords to textual descriptions The study reported in this paper will examine, whether a written (textual) copy made by an account holder for recalling the target images forming a password in subsequent use, could be used for successful authentication by an attacker. The statistical test results of the study revealed that object images had the highest guessability, followed by the doodle images. The guessability of Mikon images was either equal to or slightly higher than the art images. The results also showed that the subjects described the elements in the target image, while making a writte...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
One of the most important primitive security mechanisms is the authentication system. Authentication...
Text-based passwords are widely used for the authentication of digital assets. Typically, password s...
This paper presents a user study with 70 participants using four different image types: Mikon; doodl...
One claimed advantage of the image passwords used in recognition based graphical authentication sy...
Existing studies in the field of graphical authentication systems (GASs) have shown that users find ...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
Microsoft’s Picture Password provides a method to authenticate a user without the need of typing a c...
Abstract- Access to computer systems is most often based on the use of alphanumeric passwords. Howev...
Abstract: Usable security has unique usability challenges because the need for security often means ...
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been pro...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
People forget passwords daily, and this leads to frustration and potential loss of revenue commercia...
Recognition-based graphical authentication systems rely on the recognition of authenticator images b...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
One of the most important primitive security mechanisms is the authentication system. Authentication...
Text-based passwords are widely used for the authentication of digital assets. Typically, password s...
This paper presents a user study with 70 participants using four different image types: Mikon; doodl...
One claimed advantage of the image passwords used in recognition based graphical authentication sy...
Existing studies in the field of graphical authentication systems (GASs) have shown that users find ...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
Microsoft’s Picture Password provides a method to authenticate a user without the need of typing a c...
Abstract- Access to computer systems is most often based on the use of alphanumeric passwords. Howev...
Abstract: Usable security has unique usability challenges because the need for security often means ...
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been pro...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
People forget passwords daily, and this leads to frustration and potential loss of revenue commercia...
Recognition-based graphical authentication systems rely on the recognition of authenticator images b...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
One of the most important primitive security mechanisms is the authentication system. Authentication...
Text-based passwords are widely used for the authentication of digital assets. Typically, password s...