An investigation of keypad interface security
Information and Management
Communications of the ACM
Biometrics: advanced identity verification
Biometrics: advanced identity verification
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Usability and biometric verification at the ATM interface
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Advanced visual interfaces: the focus is on the user
The Knowledge Engineering Review
Authentication using graphical passwords: effects of tolerance and image choice
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Design and evaluation of a shoulder-surfing resistant graphical password scheme
Proceedings of the working conference on Advanced visual interfaces
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Now what was that password again? A more flexible way of identifying and authenticating our seniors
Behaviour & Information Technology - Designing Computer Systems for and with Older Users
On user involvement in production of images used in visual authentication
Journal of Visual Languages and Computing
A user friendly password authenticated key agreement for multi server environment
Proceedings of the International Conference on Advances in Computing, Communication and Control
Guidelines for designing graphical authentication mechanism interfaces
International Journal of Information and Computer Security
Feasibility study of tactile-based authentication
International Journal of Human-Computer Studies
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Shoulder surfing defence for recall-based graphical passwords
Proceedings of the Seventh Symposium on Usable Privacy and Security
Pictures or questions?: examining user responses to association-based authentication
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
A security assessment of tiles: a new portfolio-based graphical authentication system
CHI '12 Extended Abstracts on Human Factors in Computing Systems
On automated image choice for secure and usable graphical passwords
Proceedings of the 28th Annual Computer Security Applications Conference
Making graphic-based authentication secure against smudge attacks
Proceedings of the 2013 international conference on Intelligent user interfaces
Age-related performance issues for PIN and face-based authentication systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Accessible Computing (TACCESS)
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Faces and Pictures: Understanding age differences in two types of graphical authentications
International Journal of Human-Computer Studies
Hi-index | 0.00 |
This paper addresses knowledge-based authentication systems in self-service technology, presenting the design and evaluation of the Visual Identification Protocol (VIP). The basic idea behind it is to use pictures instead of numbers as a means for user authentication. Three different authentication systems based on images and visual memory were designed and compared with the traditional Personal Identification Number (PIN) approach in a longitudinal study involving 61 users. The experiment addressed performance criteria and subjective evaluation. The study and associated design exploration revealed important knowledge about users, their attitudes towards and behaviour with novel authentication approaches using images. VIP was found to provide a promising and easy-to-use alternative to the PIN. The visual code is easier to remember, preferred by users and potentially more secure than the numeric code. Results also provided guidelines to help designers make the best use of the natural power of visual memory in security solutions.