Artificial evolution for computer graphics
Proceedings of the 18th annual conference on Computer graphics and interactive techniques
Communications of the ACM
Communications of the ACM
Password security: a case history
Communications of the ACM
Hash visualization in user authentication
CHI '00 Extended Abstracts on Human Factors in Computing Systems
Visual Authentication and Identification
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Securing passwords against dictionary attacks
Proceedings of the 9th ACM conference on Computer and communications security
Usability and biometric verification at the ATM interface
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Photographic Authentication through Untrusted Terminals
IEEE Pervasive Computing
The Untrusted Computer Problem and Camera-Based Authentication
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Passwords you'll never forget, but can't recall
CHI '04 Extended Abstracts on Human Factors in Computing Systems
A PIN-entry method resilient against shoulder surfing
Proceedings of the 11th ACM conference on Computer and communications security
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Information search and re-access strategies of experienced web users
WWW '05 Proceedings of the 14th international conference on World Wide Web
Authentication using graphical passwords: effects of tolerance and image choice
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
The battle against phishing: Dynamic Security Skins
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Social navigation as a model for usable security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Design and evaluation of a shoulder-surfing resistant graphical password scheme
Proceedings of the working conference on Advanced visual interfaces
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Pass-thoughts: authenticating with our minds
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Question-based authentication using context data
Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles
Evaluating and implementing a collaborative office document system
Interacting with Computers
Increasing security and usability of computer systems with graphical passwords
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Pictures at the ATM: exploring the usability of multiple graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Password sharing: implications for security design based on social practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Graphical dictionaries and the memorable space of graphical passwords
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
On user choice in graphical password schemes
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Modeling user choice in the PassPoints graphical password scheme
Proceedings of the 3rd symposium on Usable privacy and security
Mutual image-based authentication framework with JPEG2000 in wireless environment
EURASIP Journal on Wireless Communications and Networking
On predictive models and user-drawn graphical passwords
ACM Transactions on Information and System Security (TISSEC)
Undercover: authentication usable in front of prying eyes
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Human-seeded attacks and exploiting hot-spots in graphical passwords
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Order and entropy in picture passwords
GI '08 Proceedings of graphics interface 2008
Now what was that password again? A more flexible way of identifying and authenticating our seniors
Behaviour & Information Technology - Designing Computer Systems for and with Older Users
Securing passfaces for description
Proceedings of the 4th symposium on Usable privacy and security
Use Your Illusion: secure authentication usable anywhere
Proceedings of the 4th symposium on Usable privacy and security
Action-based user authentication
International Journal of Electronic Security and Digital Forensics
POSH: a generalized captcha with security applications
Proceedings of the 1st ACM workshop on Workshop on AISec
PassShapes: utilizing stroke based authentication to increase password memorability
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
WSEAS Transactions on Information Science and Applications
The design and implementation of background Pass-Go scheme towards security threats
WSEAS Transactions on Information Science and Applications
On user involvement in production of images used in visual authentication
Journal of Visual Languages and Computing
Kendo: efficient deterministic multithreading in software
Proceedings of the 14th international conference on Architectural support for programming languages and operating systems
A comprehensive study of frequency, interference, and training of multiple graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A user friendly password authenticated key agreement for multi server environment
Proceedings of the International Conference on Advances in Computing, Communication and Control
Image-Feature Based Human Identification Protocols on Limited Display Devices
Information Security Applications
VIP: a visual approach to user authentication
Proceedings of the Working Conference on Advanced Visual Interfaces
Guidelines for designing graphical authentication mechanism interfaces
International Journal of Information and Computer Security
Look into my eyes!: can you guess my password?
Proceedings of the 5th Symposium on Usable Privacy and Security
Web History Tools and Revisitation Support: A Survey of Existing Approaches and Directions
Foundations and Trends in Human-Computer Interaction
Exploring the Use of Discrete Gestures for Authentication
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part II
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
Feasibility study of tactile-based authentication
International Journal of Human-Computer Studies
Musipass: authenticating me softly with "my" song
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
SSSL: shoulder surfing safe login
SoftCOM'09 Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks
Security design based on social and cultural practice: sharing of passwords
UI-HCII'07 Proceedings of the 2nd international conference on Usability and internationalization
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
The effect of baroque music on the PassPoints graphical password
Proceedings of the ACM International Conference on Image and Video Retrieval
A closer look at recognition-based graphical passwords on mobile devices
Proceedings of the Sixth Symposium on Usable Privacy and Security
Secure passwords through enhanced hashing
LISA'09 Proceedings of the 23rd conference on Large installation system administration
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Proceedings of the 2010 workshop on New security paradigms
Exploring usability effects of increasing security in click-based graphical passwords
Proceedings of the 26th Annual Computer Security Applications Conference
Interacting with Computers
User acceptance OTM machine: in the Arab culture
International Journal of Electronic Security and Digital Forensics
Noisy password scheme: a new one time password system
SSIP '09/MIV'09 Proceedings of the 9th WSEAS international conference on signal, speech and image processing, and 9th WSEAS international conference on Multimedia, internet & video technologies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
MARASIM: a novel jigsaw based authentication scheme using tagging
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Homogeneous physio-behavioral visual and mouse-based biometric
ACM Transactions on Computer-Human Interaction (TOCHI)
Using and managing multiple passwords: A week to a view
Interacting with Computers
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
On designing usable and secure recognition-based graphical authentication mechanisms
Interacting with Computers
Exploration of a hand-based graphical password scheme
Proceedings of the 4th international conference on Security of information and networks
PhorceField: a phish-proof password ceremony
Proceedings of the 27th Annual Computer Security Applications Conference
Breaking undercover: exploiting design flaws and nonuniform human behavior
Proceedings of the Seventh Symposium on Usable Privacy and Security
Shoulder surfing defence for recall-based graphical passwords
Proceedings of the Seventh Symposium on Usable Privacy and Security
An authentication scheme based upon face recognition for the mobile environment
CIS'04 Proceedings of the First international conference on Computational and Information Science
Effective protection against phishing and web spoofing
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A simple modeling method for mobile password schemes and its analysis
Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia
A user authentication system using schema of visual memory
BioADIT'06 Proceedings of the Second international conference on Biologically Inspired Approaches to Advanced Information Technology
A secure image-based authentication scheme for mobile devices
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Evaluating the usability and security of a graphical one-time PIN system
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Pictures or questions?: examining user responses to association-based authentication
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Journal of Systems and Software
Phish and HIPs: human interactive proofs to detect phishing attacks
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
icAuth: image-color based authentication system
Proceedings of the 2012 ACM international conference on Intelligent User Interfaces
Human identification through image evaluation using secret predicates
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Can background baroque music help to improve the memorability of graphical passwords?
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
User authentication based on JPEG2000 images
VLBV'05 Proceedings of the 9th international conference on Visual Content Processing and Representation
High-Entropy visual identification for touch screen devices
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Policy-by-example for online social networks
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Convergence: Securing converged networks - pitfalls and procedures
Network Security
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications
Proceedings of the Eighth Symposium on Usable Privacy and Security
Do you see your password?: applying recognition to textual passwords
Proceedings of the Eighth Symposium on Usable Privacy and Security
An enhanced drawing reproduction graphical password strategy
Journal of Computer Science and Technology - Special issue on Natural Language Processing
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
PassChords: secure multi-touch authentication for blind people
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
Click passwords under investigation
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
NAPTune: fine tuning graphical authentication
Proceedings of the 3rd International Conference on Human Computer Interaction
Video-passwords: advertising while authenticating
Proceedings of the 2012 workshop on New security paradigms
A hybrid recognition and recall based approach in graphical passwords
Proceedings of the 24th Australian Computer-Human Interaction Conference
On automated image choice for secure and usable graphical passwords
Proceedings of the 28th Annual Computer Security Applications Conference
Multiple password interference in graphical passwords
International Journal of Information and Computer Security
Preventing the revealing of online passwords to inappropriate websites with logininspector
lisa'12 Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques
Age-related performance issues for PIN and face-based authentication systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Accessible Computing (TACCESS)
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
A tap and gesture hybrid method for authenticating smartphone users
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Exploring the design space of graphical passwords on smartphones
Proceedings of the Ninth Symposium on Usable Privacy and Security
Usability and security evaluation of GeoPass: a geographic location-password scheme
Proceedings of the Ninth Symposium on Usable Privacy and Security
Quantifying the security of graphical passwords: the case of android unlock patterns
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
SAuth: protecting user accounts from password database leaks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Revisiting graphical passwords for augmenting, not replacing, text passwords
Proceedings of the 29th Annual Computer Security Applications Conference
Faces and Pictures: Understanding age differences in two types of graphical authentications
International Journal of Human-Computer Studies
On the security of picture gesture authentication
SEC'13 Proceedings of the 22nd USENIX conference on Security
International Journal of Security and Networks
WebCallerID: Leveraging cellular networks for Web authentication
Journal of Computer Security
Hi-index | 0.00 |
Current secure systems suffer because they neglect the importance of human factors in security. We address a fundamental weakness of knowledge-based authentication schemes, which is the human limitation to remember secure passwords. Our approach to improve the security of these systems relies on recognition-based, rather than recall-based authentication. We examine the requirements of a recognition-based authentication system and propose Déjà Vu, which authenticates a user through her ability to recognize previously seen images. Déjà Vu is more reliable and easier to use than traditional recall-based schemes, which require the user to precisely recall passwords or PINs. Furthermore, it has the advantage that it prevents users from choosing weak passwords and makes it difficult to write down or share passwords with others. We develop a prototype of Déjà Vu and conduct a user study that compares it to traditional password and PIN authentication. Our user study shows that 90% of all participants succeeded in the authentication tests using Déjà Vu while only about 70% succeeded using passwords and PINS. Our findings indicate that Déjà Vu has potential applications, especially where text input is hard (e.g., PDAs or ATMs), or in situations where passwords are infrequently used (e.g., web site passwords).