162
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Elastic password authentication scheme using the Passcell-based virtual scroll wheel

, , &
Pages 2530-2540 | Received 26 Jul 2012, Accepted 02 Nov 2012, Published online: 22 Feb 2013

References

  • A. Adams and M.A. Sasse, Users are not the enemy, Commun. ACM 42 (1999), pp. 40–46. doi: 10.1145/322796.322806
  • A.J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J.M. Smith, Smudge attacks on smartphone touch screens, Proceedings of the 4th USENIX Workshop on Offensive Technologies, Washington, DC, USA, 2010.
  • D.V. Beard, D.K. Smith, and K.M. Denelsbeck, QGOMS: A direct-manipulation tool for simple GOMS models, Proceedings of International Conference on Human Factors in Computing Systems, Vancouver, British Columbia, Canada, 1996, pp. 25–26.
  • L. Brown (ed.), Shorter Oxford English Dictionary, 6th ed., Oxford University Press, New York, 2007.
  • D. Chuan, Y. Lin, M. Linru, and C. Yuan, Towards a practical and scalable trusted software dissemination system, J. Converg. 2 (2011), pp. 53–60.
  • P. Dunphy and J. Yan, Do background images improve “draw a secret” graphical passwords?, Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2007, pp. 36–47.
  • Goms-analysen mit gomsed, 2002. Available at http://www-cgi.psychologie.tu-darmstadt.de/kogpsy/indexgoms.htm.
  • M.D. Hafiz, A.H. Abdullah, N. Ithnin, and H.K. Mammi, Towards identifying usability and security features of graphical password in knowledge based authentication technique, Proceedings of the Second Asia International Conference on Modeling Simulation, Kuala Lumpur, Malaysia, 2008, pp. 396–403.
  • B.E. John and D.E. Kieras, The goms family of user interface analysis techniques: Comparison and contrast, ACM Trans. Comp. Hum. Interact. 3 (1996), pp. 320–351. doi: 10.1145/235833.236054
  • B.E. John, K. Prevas, D.D. Salvucci, and K. Koedinger, Predictive human performance modeling made easy, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vienna, Austria, 2004, pp. 455–462.
  • M.D.E.C.E. Kettani and B. En-Nasry, Midm: An open architecture for mobile identity management, J. Converg. 2 (2011), pp. 25–32.
  • A.H. Lashkari and S. Farmand, A survey on usability and security features in graphical user authentication algorithms, Int. J. Comp. Sci. Netw. Secur. 9 (2009), pp. 195–204.
  • S. Lee and R. Myung, Modified goms-model for mobile computing, J. Soc. Korea Ind. Syst. Eng. 32 (2009), pp. 85–93.
  • A.D. Luca, K. Hertzschuch, and H. Hussmann, ColorPIN: Securing PIN entry through indirect input, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA, 2010, pp. 1103–1106.
  • Lumensoft, Available at http://lumensoft.co.kr/eng/solution/mtranskey.php.
  • Mininfo co., Available at http://www.mininfo.co.kr/solution/dementor_sgp_2.php.
  • C. Paar and J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, Springer, Berlin, Heidelberg, 2010.
  • S.B. Park, A method for preventing input information from exposing to observers, patent App. No.: 10-2004-0039209, Korea, 2004.
  • Passfaces, Available at http://www.realuser.com.
  • V. Roth, K. Richter, and R. Freidinger, A PIN-Entry method resilient against shoulder surfing, Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2004, pp. 236–245.
  • P. Shi, B. Zhu, and A. Youssef, A PIN entry scheme resistant to recording-based shoulder-surfing, Proceedings of the 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, Athens, Glyfada, Greece, 2009, pp. 237–241.
  • R.Y. Shtykh and Q. Jin, A human-centric integrated approach to web information search and sharing, Human-centric Comput. Inf. Sci. 1(2) (2011), pp. 1–37.
  • T. Takada, FakePointer: An authentication scheme for improving security against peeping attacks using video cameras, Proceedings of the Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, Valencia, Spain, 2008, pp. 395–400.
  • T. Teraoka, Organization and exploration of heterogeneous personal data collected in daily life, Human-centric Comput. Inf. Sci. 2(1) (2012), pp. 1–15. doi: 10.1186/2192-1962-2-1
  • C.S.C. (USA), Department of Defense Password Management Guideline, CSC-STD-002-85, Department of Defense Computer Security Center, Fort George G. Meade, MD, 1986.
  • S. Wiedenbeck, J. Waters, L. Sobrado, and J.C. Birget, Design and evaluation of a shoulder-surfing resistant graphical password scheme, Proceedings of the Working Conference on Advanced Visual Interfaces, Venezia, Italy, 2006, pp. 177–184.
  • J. Yan, A. Blackwell, R. Anderson, and A. Grant, Password memorability and security: Empirical results, IEEE Secur. Priv. 2 (2004), pp. 25–31. doi: 10.1109/MSP.2004.81
  • J.H. Yi, G. Ma, H. Yi, and S. Kim, Method and apparatus for authenticating password using scroll wheel of user device, patent App. No.: 10-2011-0128303, Korea, 2011.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.