Existing studies in the field of graphical authentication systems (GASs) have shown that users find it difficult to remember multiple image passwords. In this context, it is believed that memorability can be improved if target images making up a graphical password are selected using a mnemonic strategy during the registration stage. We conducted a usability study with 80 subjects, who were required to create four graphical passwords, each using a mnemonic strategy and recall them every week, for a period of four weeks. The results demonstrated that the memorability of the image passwords created using a mnemonic strategy do not improve even when compared to the existing multiple password studies. Hence remembering multiple image passwords u...
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been pro...
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs)...
Memorability and security of passwords are two distinct extremes that are difficult to achieve at th...
Complex passwords are hard to remember, so people often pick simple passwords, write complex ones do...
Graphical passwords are an alternative form of authentication that use images for login, and leverag...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Passwords are the most common form of authentication. The password memorability problem is magnified...
Passwords are the most common form of authentication. The password memorability problem is magnified...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Memorability and security of passwords are two distinct extremes that are difficult to achieve at ...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Passwords authentication has become a widely recognized element of computer security for confirming ...
Abstract: Usable security has unique usability challenges because the need for security often means ...
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been pro...
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs)...
Memorability and security of passwords are two distinct extremes that are difficult to achieve at th...
Complex passwords are hard to remember, so people often pick simple passwords, write complex ones do...
Graphical passwords are an alternative form of authentication that use images for login, and leverag...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Passwords are the most common form of authentication. The password memorability problem is magnified...
Passwords are the most common form of authentication. The password memorability problem is magnified...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Memorability and security of passwords are two distinct extremes that are difficult to achieve at ...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Passwords authentication has become a widely recognized element of computer security for confirming ...
Abstract: Usable security has unique usability challenges because the need for security often means ...
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been pro...
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs)...
Memorability and security of passwords are two distinct extremes that are difficult to achieve at th...