Cognitive passwords: the key to easy access control
Computers and Security
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
Communications of the ACM
Password-Based Authentication: A System Perspective
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7 - Volume 7
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Human selection of mnemonic phrase-based passwords
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Pictures at the ATM: exploring the usability of multiple graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
On user choice in graphical password schemes
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Use Your Illusion: secure authentication usable anywhere
Proceedings of the 4th symposium on Usable privacy and security
Computer usage by young individuals with down syndrome: an exploratory study
Proceedings of the 10th international ACM SIGACCESS conference on Computers and accessibility
A comprehensive study of frequency, interference, and training of multiple graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
VIP: a visual approach to user authentication
Proceedings of the Working Conference on Advanced Visual Interfaces
Proceedings of the 46th Annual Design Automation Conference
Don't listen! I am dictating my password!
Proceedings of the 11th international ACM SIGACCESS conference on Computers and accessibility
Multiple password interference in text passwords and click-based graphical passwords
Proceedings of the 16th ACM conference on Computer and communications security
Feasibility study of tactile-based authentication
International Journal of Human-Computer Studies
Computer Usage by Children with Down Syndrome: Challenges and Future Research
ACM Transactions on Accessible Computing (TACCESS)
Towards A Universally Usable Human Interaction Proof: Evaluation of Task Completion Strategies
ACM Transactions on Accessible Computing (TACCESS)
Accessible privacy and security: a universally usable human-interaction proof tool
Universal Access in the Information Society - Special Issue: Designing Inclusive Futures
Toward tactile authentication for blind users
Proceedings of the 12th international ACM SIGACCESS conference on Computers and accessibility
Tactile vs graphical authentication
EuroHaptics'10 Proceedings of the 2010 international conference on Haptics: generating and perceiving tangible sensations, Part I
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using and managing multiple passwords: A week to a view
Interacting with Computers
Understanding the computer skills of adult expert users with down syndrome: an exploratory study
The proceedings of the 13th international ACM SIGACCESS conference on Computers and accessibility
Evaluating Usability of Three Authentication Methods in Web-Based Application
SERA '11 Proceedings of the 2011 Ninth International Conference on Software Engineering Research, Management and Applications
On designing usable and secure recognition-based graphical authentication mechanisms
Interacting with Computers
Representing users in accessibility research
ACM Transactions on Accessible Computing (TACCESS)
Biometric-rich gestures: a novel approach to authentication on multi-touch devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Disabilities and Authentication Methods: Usability and Security
ARES '12 Proceedings of the 2012 Seventh International Conference on Availability, Reliability and Security
PassChords: secure multi-touch authentication for blind people
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
Investigating authentication methods used by individuals with down syndrome
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
Hi-index | 0.00 |
A wide variety of authentication mechanisms have been designed to ensure information security. Individuals with cognitive disabilities depend on computers and the Internet for a variety of tasks and, therefore, use authentication applications on an everyday basis. However, although there have been numerous studies investigating password usage by neurotypical users, there have been no research studies conducted to examine the use of authentication methods by individuals with cognitive disabilities. In this article, we systematically investigate how individuals with cognitive disabilities, specifically Down syndrome (DS), interact with various user authentication mechanisms. This research provides the first benchmark data on the performance of individuals with DS when using multiple authentication methods. It confirms that individuals with DS are capable of using the traditional alphanumeric passwords with reasonable efficiency. The passwords created by individuals with DS are of similar strength to those created by neurotypical people. Graphic passwords are not as effective as traditional alphanumeric and mnemonic passwords regarding efficiency, and are less preferred by the participants. Based on the findings of the study, we propose design guidelines that aim to assist both practitioners and researchers in designing and developing effective authentication applications that fit the specific needs of individuals with DS.