Recognition-based graphical authentication systems rely on the recognition of authenticator images by legitimate users for authentication. This paper presents the results of a study that compared doodle images and Mikon images as authenticators in recognition based graphical authentication systems taking various usability dimensions into account. The results of the usability evaluation, with 20 participants, demonstrated that users preferred Mikon to doodle images as authenticators in recognition based graphical authentication mechanisms. Furthermore, participants found it difficult to recognize doodle images during authentication as well as associate them with something meaningful. Our findings also show the need to consider t...
Recognition-based visual authentication schemes use a variety of different kinds of images. These ...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...
Recognition-based graphical authentication systems rely on the recognition of authenticator images b...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been pro...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Passwords authentication has become a widely recognized element of computer security for confirming ...
This paper presents a user study with 70 participants using four different image types: Mikon; doodl...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
User Authentication is a critical component in information security. Several widely used mechanisms ...
One claimed advantage of the image passwords used in recognition based graphical authentication sy...
This thesis investigates the usability and security of recognition-based graphical authentication sc...
Recognition-based visual authentication schemes use a variety of different kinds of images. These ...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...
Recognition-based graphical authentication systems rely on the recognition of authenticator images b...
Recognition-based graphical authentication systems rely on the recognition of authenticator images...
Part 1: Long and Short Papers (Continued)International audienceRecognition-based graphical authentic...
Recognition-based graphical authentication systems (RBGSs) using images as passwords have been pro...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some s...
The weakness of knowledge-based authentication systems, such as passwords and Personal Identificatio...
Passwords authentication has become a widely recognized element of computer security for confirming ...
This paper presents a user study with 70 participants using four different image types: Mikon; doodl...
Graphical passwords are a novel method of knowledge-based authentication that shows promise for impr...
User Authentication is a critical component in information security. Several widely used mechanisms ...
One claimed advantage of the image passwords used in recognition based graphical authentication sy...
This thesis investigates the usability and security of recognition-based graphical authentication sc...
Recognition-based visual authentication schemes use a variety of different kinds of images. These ...
User Authentication is a critical component in information security. Several widely used mechanisms ...
Most users find it difficult to remember traditional text-based passwords. In order to cope with mul...