This thesis contributes to the study of the usability and security of visuo-cognitive authentication techniques, particularly those relying on recognition of abstract images, an area little researched. Many usability and security problems with linguistic passwords (including traditional text-based passwords) have been known for decades. Research into visually-based techniques intends to overcome these by using the extensive human capacity for recognising images, and add to the range of commercially viable authentication solutions. The research employs a mixed methodology to develop several contributions to the field. A novel taxonomy of visuo-cognitive authentication techniques is presented. This is based on analysis and synthesis of existi...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Authentication systems used in the security world vary greatly but one system, the textual password ...
Many conventional methods exist to authenticate a user, including text-based systems and graphical s...
A thesis submitted to the University of Bedfordshire, in partial fulfilment of the requirements for ...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
This dissertation presents an assessment made on alternative authentication method to the present me...
One of the most important primitive security mechanisms is the authentication system. Authentication...
This dissertation presents an assessment made on an alternative to the present password and PIN-base...
Part 1: Long and Short Papers (Continued)International audienceStimulated by a large number of diffe...
Mobile and wearable devices are popular platforms for accessing online services. However, the small ...
A thesis submitted to the University of Bedfordshire, in partial fulfillment of the requirements for...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Usable security has unique usability challenges because the need for security often means that stand...
Abstract- Access to computer systems is most often based on the use of alphanumeric passwords. Howev...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Authentication systems used in the security world vary greatly but one system, the textual password ...
Many conventional methods exist to authenticate a user, including text-based systems and graphical s...
A thesis submitted to the University of Bedfordshire, in partial fulfilment of the requirements for ...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
This dissertation presents an assessment made on alternative authentication method to the present me...
One of the most important primitive security mechanisms is the authentication system. Authentication...
This dissertation presents an assessment made on an alternative to the present password and PIN-base...
Part 1: Long and Short Papers (Continued)International audienceStimulated by a large number of diffe...
Mobile and wearable devices are popular platforms for accessing online services. However, the small ...
A thesis submitted to the University of Bedfordshire, in partial fulfillment of the requirements for...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Usable security has unique usability challenges because the need for security often means that stand...
Abstract- Access to computer systems is most often based on the use of alphanumeric passwords. Howev...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Authentication systems used in the security world vary greatly but one system, the textual password ...
Many conventional methods exist to authenticate a user, including text-based systems and graphical s...