Cognitive passwords: the key to easy access control
Computers and Security
Quality guidelines = designer metrics
TRI-Ada '94 Proceedings of the conference on TRI-Ada '94
Pass-sentence—a new approach to computer code
Computers and Security
Using latency to evaluate interactive system performance
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
Some observations on software quality
ACM-SE 37 Proceedings of the 37th annual Southeast regional conference (CD-ROM)
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Communications of the ACM
Communications of the ACM
Identity theft, social security numbers, and the Web
Communications of the ACM
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
Protecting secret keys with personal entropy
Future Generation Computer Systems - Special issue on security on the Web
Error-tolerant password recovery
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Users' conceptions of risks and harms on the web: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Doodling our way to better authentication
CHI '02 Extended Abstracts on Human Factors in Computing Systems
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Enhanced Password Authentication through Fuzzy Logic
IEEE Expert: Intelligent Systems and Their Applications
Usability and biometric verification at the ATM interface
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proposal of user identification scheme using mouse
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Making Passwords Secure and Usable
HCI 97 Proceedings of HCI on People and Computers XII
Integrating Faces and Fingerprints for Personal Identification
ACCV '98 Proceedings of the Third Asian Conference on Computer Vision-Volume I - Volume I
ACM '81 Proceedings of the ACM '81 conference
Building Accessible Websites
Face recognition: A literature survey
ACM Computing Surveys (CSUR)
Queue - Game Development
The domino effect of password reuse
Communications of the ACM - Human-computer etiquette
Customers, Passwords, and Web Sites
IEEE Security and Privacy
Secrets and Lies
Practical Unix & Internet Security, 3rd Edition
Practical Unix & Internet Security, 3rd Edition
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Information Security Governance
Information Security Governance
VIP: a visual approach to user authentication
Proceedings of the Working Conference on Advanced Visual Interfaces
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Action-based user authentication
International Journal of Electronic Security and Digital Forensics
On designing usable and secure recognition-based graphical authentication mechanisms
Interacting with Computers
Hi-index | 0.00 |
Users wishing to use secure computer systems or web sites are required to authenticate themselves. Users are usually required to supply a user identification and to authenticate themselves to prove that they are indeed the person they claim to be. The authenticator of choice in the web environment is the simple password. Since the advent of the web the proliferation of secure systems has placed an unacceptable burden on users to recall increasing numbers of passwords that are often infrequently used. This paper will review the research into different types of authentication mechanisms, including simple passwords, and propose a mechanism for quantifying the quality of different authentication mechanisms to support an informed choice for web site administrators.