A thesis submitted to the University of Bedfordshire, in partial fulfilment of the requirements for the degree of Ph.D.This thesis contributes to the study of the usability and security of visuo-cognitive authentication techniques, particularly those relying on recognition of abstract images, an area little researched. Many usability and security problems with linguistic passwords (including traditional text-based passwords) have been known for decades. Research into visually-based techniques intends to overcome these by using the extensive human capacity for recognising images, and add to the range of commercially viable authentication solutions. The research employs a mixed methodology to develop several contributions to the field. A no...
Many conventional methods exist to authenticate a user, including text-based systems and graphical s...
The purpose of this paper is increasing the safety house and avoiding the weakness of typical word. ...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
This thesis contributes to the study of the usability and security of visuo-cognitive authentication...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
This dissertation presents an assessment made on alternative authentication method to the present me...
This dissertation presents an assessment made on an alternative to the present password and PIN-base...
Part 1: Long and Short Papers (Continued)International audienceStimulated by a large number of diffe...
One of the most important primitive security mechanisms is the authentication system. Authentication...
A thesis submitted to the University of Bedfordshire, in partial fulfillment of the requirements for...
Mobile and wearable devices are popular platforms for accessing online services. However, the small ...
Authentication systems used in the security world vary greatly but one system, the textual password ...
Abstract- Access to computer systems is most often based on the use of alphanumeric passwords. Howev...
Usable security has unique usability challenges because the need for security often means that stand...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Many conventional methods exist to authenticate a user, including text-based systems and graphical s...
The purpose of this paper is increasing the safety house and avoiding the weakness of typical word. ...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
This thesis contributes to the study of the usability and security of visuo-cognitive authentication...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
This dissertation presents an assessment made on alternative authentication method to the present me...
This dissertation presents an assessment made on an alternative to the present password and PIN-base...
Part 1: Long and Short Papers (Continued)International audienceStimulated by a large number of diffe...
One of the most important primitive security mechanisms is the authentication system. Authentication...
A thesis submitted to the University of Bedfordshire, in partial fulfillment of the requirements for...
Mobile and wearable devices are popular platforms for accessing online services. However, the small ...
Authentication systems used in the security world vary greatly but one system, the textual password ...
Abstract- Access to computer systems is most often based on the use of alphanumeric passwords. Howev...
Usable security has unique usability challenges because the need for security often means that stand...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Many conventional methods exist to authenticate a user, including text-based systems and graphical s...
The purpose of this paper is increasing the safety house and avoiding the weakness of typical word. ...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...