Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Are Graphical Authentication Mechanisms As Strong As Passwords?
Univ Glasgow, Sch Comp Sci, Glasgow G12 8QQ, Lanark, Scotland.
Tech Univ Darmstadt, CASED, Darmstadt, Germany.ORCID-id: 0000-0003-2674-4043
Univ Glasgow, Sch Comp Sci, Glasgow G12 8QQ, Lanark, Scotland..
2013 (Engelska)Ingår i: 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), Polish Information Processing Society , 2013, s. 837-844Konferensbidrag, Publicerat paper (Refereegranskat)
Resurstyp
Text
Abstract [en]

The fact that users struggle to keep up with all their (textual) passwords is no secret. Thus, one could argue that the textual password needs to be replaced. One alternative is graphical authentication. A wide range of graphical mechanisms have been proposed in the research literature. Yet, the industry has not embraced these alternatives. We use nowadays (textual) passwords several times a day to mediate access to protected resources and to ensure that accountability is facilitated. Consequently, the main aspect of interest to decision-makers is the strength of an authentication mechanism to resist intrusion attempts. Yet, researchers proposing alternative mechanisms have primarily focused on the users' need for superior usability while the strength of the mechanisms often remains unknown to the decision makers. In this paper we describe a range of graphical authentication mechanisms and consider how much strength they exhibit, in comparison to the textual password. As basic criteria for this comparison, we use the standard guessability, observability and recordability metrics proposed by De Angell et at. in 2005. The intention of this paper is to provide a better understanding of the potential for graphical mechanisms to be equal to, or superior to, the password in terms of meeting its most basic requirement namely resisting intrusion attempts.

Ort, förlag, år, upplaga, sidor
Polish Information Processing Society , 2013. s. 837-844
Serie
Federated Conference on Computer Science and Information Systems, ISSN 2325-0348
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
URN: urn:nbn:se:kau:diva-44905ISI: 000347171500135ISBN: 978-1-4673-4471-5 (tryckt)OAI: oai:DiVA.org:kau-44905DiVA, id: diva2:952890
Konferens
Federated Conference on Computer Science and Information Systems (FedCSIS), SEP 08-11, 2013, Krakow, POLAND
Tillgänglig från: 2016-08-16 Skapad: 2016-08-15 Senast uppdaterad: 2018-06-04Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Personposter BETA

Volkamer, Melanie

Sök vidare i DiVA

Av författaren/redaktören
Volkamer, Melanie
Datavetenskap (datalogi)

Sök vidare utanför DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetricpoäng

isbn
urn-nbn
Totalt: 116 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf