Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Authentication Schemes - Comparison and Effective Password Spaces
Technische Universität Darmstadt, Germany.
Technische Universität Darmstadt, Germany.ORCID-id: 0000-0003-2674-4043
echnische Universität Darmstadt, Germany.
2014 (Engelska)Ingår i: INFORMATION SYSTEMS SECURITY (ICISS 2014), Springer, 2014, s. 204-225Konferensbidrag, Publicerat paper (Refereegranskat)
Resurstyp
Text
Abstract [en]

Text passwords are ubiquitous in authentication. Despite this ubiquity, they have been the target of much criticism. One alternative to the pure recall text passwords are graphical authentication schemes. The different proposed schemes harness the vast visual memory of the human brain and exploit cued-recall as well as recognition in addition to pure recall. While graphical authentication in general is promising, basic research is required to better understand which schemes are most appropriate for which scenario (incl. security model and frequency of usage). This paper presents a comparative study in which all schemes are configured to the same effective password space (as used by large Internet companies). The experiment includes both, cued-recall-based and recognition-based schemes. The results demonstrate that recognition-based schemes have the upper hand in terms of effectiveness and cued-recall-based schemes in terms of efficiency. Thus, depending on the scenario one or the other approach is more appropriate. Both types of schemes have lower reset rates than text passwords which might be of interest in scenarios with limited support capacities.

Ort, förlag, år, upplaga, sidor
Springer, 2014. s. 204-225
Serie
Lecture Notes in Computer Science, ISSN 0302-9743 ; 8880
Nyckelord [en]
Usable Security, Authentication, Graphical Passwords
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
URN: urn:nbn:se:kau:diva-44902DOI: 10.1007/978-3-319-13841-1_12ISI: 000354696600012ISBN: 978-3-319-13841-1 (digital)ISBN: 978-3-319-13840-4 (tryckt)OAI: oai:DiVA.org:kau-44902DiVA, id: diva2:952894
Konferens
10th International Conference on Information System Security (ICISS), DEC 16-20, 2014, Inst Dev & Res Banking Technol, Hyderabad, INDIA
Tillgänglig från: 2016-08-16 Skapad: 2016-08-15 Senast uppdaterad: 2019-11-11Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltext

Personposter BETA

Volkamer, Melanie

Sök vidare i DiVA

Av författaren/redaktören
Volkamer, Melanie
Datavetenskap (datalogi)

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetricpoäng

doi
isbn
urn-nbn
Totalt: 133 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf