Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Are Graphical Authentication Mechanisms As Strong As Passwords?
Univ Glasgow, Sch Comp Sci, Glasgow G12 8QQ, Lanark, Scotland.
Tech Univ Darmstadt, CASED, Darmstadt, Germany.ORCID-id: 0000-0003-2674-4043
Univ Glasgow, Sch Comp Sci, Glasgow G12 8QQ, Lanark, Scotland..
2013 (engelsk)Inngår i: 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), Polish Information Processing Society , 2013, s. 837-844Konferansepaper, Publicerat paper (Fagfellevurdert)
Resurstyp
Text
Abstract [en]

The fact that users struggle to keep up with all their (textual) passwords is no secret. Thus, one could argue that the textual password needs to be replaced. One alternative is graphical authentication. A wide range of graphical mechanisms have been proposed in the research literature. Yet, the industry has not embraced these alternatives. We use nowadays (textual) passwords several times a day to mediate access to protected resources and to ensure that accountability is facilitated. Consequently, the main aspect of interest to decision-makers is the strength of an authentication mechanism to resist intrusion attempts. Yet, researchers proposing alternative mechanisms have primarily focused on the users' need for superior usability while the strength of the mechanisms often remains unknown to the decision makers. In this paper we describe a range of graphical authentication mechanisms and consider how much strength they exhibit, in comparison to the textual password. As basic criteria for this comparison, we use the standard guessability, observability and recordability metrics proposed by De Angell et at. in 2005. The intention of this paper is to provide a better understanding of the potential for graphical mechanisms to be equal to, or superior to, the password in terms of meeting its most basic requirement namely resisting intrusion attempts.

sted, utgiver, år, opplag, sider
Polish Information Processing Society , 2013. s. 837-844
Serie
Federated Conference on Computer Science and Information Systems, ISSN 2325-0348
HSV kategori
Forskningsprogram
Datavetenskap
Identifikatorer
URN: urn:nbn:se:kau:diva-44905ISI: 000347171500135ISBN: 978-1-4673-4471-5 (tryckt)OAI: oai:DiVA.org:kau-44905DiVA, id: diva2:952890
Konferanse
Federated Conference on Computer Science and Information Systems (FedCSIS), SEP 08-11, 2013, Krakow, POLAND
Tilgjengelig fra: 2016-08-16 Laget: 2016-08-15 Sist oppdatert: 2018-06-04bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Personposter BETA

Volkamer, Melanie

Søk i DiVA

Av forfatter/redaktør
Volkamer, Melanie

Søk utenfor DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric

isbn
urn-nbn
Totalt: 116 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf