International audienceSelecting and remembering secure passwords puts a high cognitive burdenon the user, which has adverse effects on usability and security.Authentication schemes based on implicit memory can relieve the user ofthe burden of actively remembering a secure password. In this paper, wepropose a new authentication scheme (MooneyAuth) that relies onimplicitly remembering the content of previously seen Mooney images.These images are thresholded two-tone images derived from imagescontaining single objects. Our scheme has two phases: In the enrollmentphase, a user is presented with Mooney images, their correspondingoriginal images, and labels. This creates an implicit link between theMooney image and the object in the user's memory...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...
A variety of authentication mechanisms are used for online applications to protect user’s data. Prio...
People tend to choose predictable passwords which are vulnerable to guessing attacks. To combat the ...
Abstract- Access to computer systems is most often based on the use of alphanumeric passwords. Howev...
A thesis submitted to the University of Bedfordshire, in partial fulfilment of the requirements for ...
Existing studies in the field of graphical authentication systems (GASs) have shown that users find ...
In this work, we proposed dynamic retraining (RU), wind vane module (WVM), BubbleMap (BMap), and rei...
Complex passwords are hard to remember, so people often pick simple passwords, write complex ones do...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
Part 9: Usable SecurityInternational audienceWe present the design and user study of an adaptive aut...
Authentication codes such as passwords and PIN numbers are widely used to control access to resource...
Alphanumerical usernames and passwords are the most used computer authentication technique. This app...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...
A variety of authentication mechanisms are used for online applications to protect user’s data. Prio...
People tend to choose predictable passwords which are vulnerable to guessing attacks. To combat the ...
Abstract- Access to computer systems is most often based on the use of alphanumeric passwords. Howev...
A thesis submitted to the University of Bedfordshire, in partial fulfilment of the requirements for ...
Existing studies in the field of graphical authentication systems (GASs) have shown that users find ...
In this work, we proposed dynamic retraining (RU), wind vane module (WVM), BubbleMap (BMap), and rei...
Complex passwords are hard to remember, so people often pick simple passwords, write complex ones do...
The need for both usable and secure authentication is more pronounced than ever before. Security res...
With computers being used ever more ubiquitously in situations where privacy is important, secure us...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
Part 9: Usable SecurityInternational audienceWe present the design and user study of an adaptive aut...
Authentication codes such as passwords and PIN numbers are widely used to control access to resource...
Alphanumerical usernames and passwords are the most used computer authentication technique. This app...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...
A variety of authentication mechanisms are used for online applications to protect user’s data. Prio...