A User Identification System Using Signature Written with Mouse
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Performance Analysis and Parallel Implementation of Dedicated Hash Functions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Towards Secure Design Choices for Implementing Graphical Passwords
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Graphical dictionaries and the memorable space of graphical passwords
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
WSEAS Transactions on Information Science and Applications
Hi-index | 0.00 |
Psychological studies have shown a substantial improvement of performance in remembering (recalling and recognizing) pictorial representations of materials over verbal ones. The motivation behind exploring a graphical password scheme was based on the remarkable ability of humans to recall pictures. In this paper, we present a novel, user-friendly, recall-based graphical password scheme, R-DAS, where the user is allowed to rotate the canvas on which he draws the password. We perform an analysis that shows that rotation, as an added degree of freedom, not only increases the full graphical password space, but more importantly increases the predictable graphical password space corresponding to the number of components (strokes). With the visually obvious technique of rotation, R-DAS provides greater security than existing schemes built using the "Draw-A-Secret" scheme without compromising user convenience.