Permutation Generation Methods
ACM Computing Surveys (CSUR)
Password security: a case history
Communications of the ACM
Authentication: from passwords to public keys
Authentication: from passwords to public keys
Fast dictionary attacks on passwords using time-space tradeoff
Proceedings of the 12th ACM conference on Computer and communications security
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Visual passwords: cure-all or snake-oil?
Communications of the ACM - Finding the Fun in Computer Science Education
Encountering stronger password requirements: user attitudes and behaviors
Proceedings of the Sixth Symposium on Usable Privacy and Security
A closer look at recognition-based graphical passwords on mobile devices
Proceedings of the Sixth Symposium on Usable Privacy and Security
How much assurance does a PIN provide?
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Hi-index | 0.00 |
Graphical passwords can replace alphanumeric passwords when the data entry device is not a keyboard, but a touchscreen instead, as is the case for modern mobile devices (smartphones and tablets). However, misinterpretations on the security of graphical passwords compared to textual ones can lead to insecure systems. This paper outlines a set of security best practices concerning the design of icon-based authentication mechanisms. The best practices have been derived from a behavioral study on the usability of a prototype. The paper also proposes methods for quality control and protection against brute force attacks against icon-based passwords.