This dissertation presents an assessment made on an alternative to the present password and PIN-based methods of user authentication. In the recent years, many alternative authentication methods emerged, but none of them seems to have been a major breakthrough. Nevertheless, two techniques emerged as potentially efficient: image-based authentication and cognitive questions techniques. Even if the viability of these techniques has been proved, rare are the researches that assessed the resilience of the methods to impostors. Therefore, an environment has been created to test the robustness of the alternative techniques, and rendered available to the widest possible audience. The evaluation comprises both a theoretical and a pragmatic analysis...
We present attacks against two cognitive authentication schemes [3] recently proposed at the 2006 I...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
The most common mechanism for online authenti- cation is the username-password. Majority of e- comme...
On the Internet, there is an uneasy tension between the security and usability of authentication mec...
A thesis submitted to the University of Bedfordshire, in partial fulfilment of the requirements for ...
Authentication via selected extraction from electronic personal histories is a novel question-based ...
This dissertation presents an assessment made on alternative authentication method to the present me...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
On the Internet, there is an uneasy tension between the security and usability of authentication mec...
We present attacks against two cognitive authentication schemes [9] proposed at the 2006 IEEE Sympos...
Nowadays many systems require end users to authenticate themselves. Authentication is one of the sec...
International audienceTouch screens have become ubiquitous in the past few years, like for instance ...
Abstract—Users often choose passwords that are easy to remember but also easy to guess by attackers....
Authentication via electronic personal history questions is a novel technique that aims to enhance q...
Confidential electronic services such as chat, e-commerce and banking services should be accessible ...
We present attacks against two cognitive authentication schemes [3] recently proposed at the 2006 I...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
The most common mechanism for online authenti- cation is the username-password. Majority of e- comme...
On the Internet, there is an uneasy tension between the security and usability of authentication mec...
A thesis submitted to the University of Bedfordshire, in partial fulfilment of the requirements for ...
Authentication via selected extraction from electronic personal histories is a novel question-based ...
This dissertation presents an assessment made on alternative authentication method to the present me...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
On the Internet, there is an uneasy tension between the security and usability of authentication mec...
We present attacks against two cognitive authentication schemes [9] proposed at the 2006 IEEE Sympos...
Nowadays many systems require end users to authenticate themselves. Authentication is one of the sec...
International audienceTouch screens have become ubiquitous in the past few years, like for instance ...
Abstract—Users often choose passwords that are easy to remember but also easy to guess by attackers....
Authentication via electronic personal history questions is a novel technique that aims to enhance q...
Confidential electronic services such as chat, e-commerce and banking services should be accessible ...
We present attacks against two cognitive authentication schemes [3] recently proposed at the 2006 I...
Humans develop skills as they go through their lives: some are fairly common, such as reading, but o...
The most common mechanism for online authenti- cation is the username-password. Majority of e- comme...