9
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

RSVP a temporal method for graphical authentication

&

References

  • Andriotis, P., Tryfonas, T., Oikonomou, G., & Yildiz, C. (2013). A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary; 1–6.
  • Behl, U., Bhat, D., Ubhaykar, N., Godbole, V., & Kulkarni, S. (2014). Multi-level scalable textual-graphical password authentication scheme for web based applications. REV Journal on Electronics and Communications, 3(3–4), 116–123. doi:10.21553/rev-jec.64
  • Bicakci, K., Atalay, N. B., Yuceel, M., Gurbaslar, H., & Erdeniz, B. (2009). Towards usable solutions to graphical password hotspot problem. In 33rd Annual IEEE International Conference of Computer Software and Applications Conference, 2, 318–323.
  • Biddle, R., Chiasson, S., & Van Oorschot, P. C. (2012). Graphical passwords: Learning from the first twelve years. ACM Computing Surveys (CSUR), 44(4), 19. doi:10.1145/2333112.2333114
  • Biederman, I. (1987). Recognition-by-components: A theory of human image understanding. Psychological Review, 94(2), 115–147. doi:10.1037/0033-295X.94.2.115
  • Brostoff, S., & Sasse, M. A. (2000). Are passfaces more usable than passwords? A field trial investigation. In McDonald, S., et al. (Eds.) People and computers XIV—Usability or else! (pp. 405–424). Berlin, London : Springer.
  • Cain, A. A., Chiu, L., Santiago, F., & Still, J. D. (2016). Swipe authentication: Exploring over-the-shoulder-attack performance. Proceedings of the 7th International Conference on Applied Human Factors and Ergonomics (AHFE 2016). Orlando, FL.
  • Cain, A. A., Werner, S., & Still, J. D. (2017). Graphical authentication resistance to over-the-shoulder-attacks. Proceeding of CHI in Late-Breaking Work. Montréal, Canada.
  • Cave, C. B. (1997). Very long-lasting priming in picture naming. Psychological Science, 8(4), 322–325. doi:10.1111/j.1467-9280.1997.tb00446.x
  • Davis, D., Monrose, F., & Reiter, M. K. (2004). On user choice in graphical password schemes. Proceedings of the 13th USENIX Security Symposium, San Diego (Vol. 13, pp. 11–11).
  • De Luca, A., Hertzschuch, K., & Hussmann, H. (2010). ColorPIN: Securing PIN entry through indirect input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, GA, 1103–1106.
  • Dieter Findling, R., & Mayrhofer, R. (2013). Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices. International Journal of Pervasive Computing and Communications, 9(3), 190–208. doi:10.1108/IJPCC-05-2013-0012
  • Eljetlawi, A. M., & Ithnin, N. (2008). Graphical password: Comprehensive study of the usability features of the recognition base graphical password methods. In Third International Conference of Convergence and Hybrid Information Technology, 2, 1137–1143. Flickr. Retrieved October, 2017 from https://www.flickr.com/photos/playingwithpsp/278491699
  • Gao, H., Liu, X., Dai, R., Wang, S., & Chang, X. (2009). Analysis and evaluation of the colorlogin graphical password scheme. In Fifth International Conference on Image and Graphics, Xi’an, Shanxi, China, 722–727.
  • Hayashi, E., Dhamija, R., Christin, N., & Perrig, A. (2008). Use your illusion: Secure authentication usable anywhere. In Proceedings of the 4th Symposium on Usable Privacy and Security, Pittsburgh, PA, 35–45. Good free photos. Retrieved October, 2017 from https://www.goodfreephotos.com/vector-images/goblet-line-drawingvector-clipart.png.php
  • Liu, X. Y., Gao, H. C., Wang, L. M., & Chang, X. L. (2011). An enhanced drawing reproduction graphical password strategy. Journal of Computer Science and Technology, 26(6), 988–999. doi:10.1007/s11390-011-1195-7
  • Nelson, D. L., Reed, V. S., & Walling, J. R. (1976). Pictorial superiority effect. Journal of Experimental Psychology: Human Learning and Memory, 2(5), 523.
  • Nicholson, J., Coventry, L., & Briggs, P. (2013). Faces and Pictures: Understanding age differences in two types of graphical authentications. International Journal of Human-Computer Studies, 71(10), 958–966. doi:10.1016/j.ijhcs.2013.07.001
  • Nickerson, R. S. (1965). Short-term memory for complex meaningful visual configurations: A demonstration of capacity. Canadian Journal of Psychology/Revue Canadienne De Psychologie, Erlbaum, 19(2), 155–160. doi:10.1037/h0082899
  • Paivio, A. (2013). Imagery and verbal processes. Psychology Press.
  • Pering, T., Sundar, M., Light, J., & Want, R. (2003). Photographic authentication through untrusted terminals. IEEE Pervasive Computing, 2(1), 30–36. doi:10.1109/MPRV.2003.1186723
  • Potter, M. C., Chun, M. M., Banks, B. S., & Muckenhoupt, M. (1998). Two attentional deficits in serial target search: The visual attentional blink and an amodal task-switch deficit. Journal of Experimental Psychology: Learning, Memory, and Cognition, 24(4), 979. Public domain pictures. Retrieved October, 2017 from http://www.publicdomainpictures.net/view-image.php?image=184516&picture=kitten-lineart-drawing
  • RealUser. Retrieved June, 2005 from www.realuser.com.
  • Schacter, D. L., Chiu, C. Y. P., & Ochsner, K. N. (1993). Implicit memory: A selective review. Annual Review of Neuroscience, 16(1), 159–182. doi:10.1146/annurev.ne.16.030193.001111
  • Schaub, F., Deyhle, R., & Weber, M. (2012). Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, New York, NY, 13–23.
  • Shepard, R. N. (1967). Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior, 6(1), 156–163. doi:10.1016/S0022-5371(67)80067-7
  • Snodgrass, J. G., & Corwin, J. (1988). Perceptual identification thresholds for 150 fragmented pictures from the Snodgrass and Vanderwart picture set. Perceptual and Motor Skills, 67(1), 3–36. doi:10.2466/pms.1988.67.1.3
  • Snodgrass, J. G., & Vanderwart, M. (1980). A standardized set of 260 pictures: Norms for name agreement, image agreement, familiarity, and visual complexity. Journal of Experimental Psychology: Human Learning and Memory, 6(2), 174.
  • Standing, L. (1973). Learning 10000 pictures. The Quarterly Journal of Experimental Psychology, 25(2), 207–222. doi:10.1080/14640747308400340
  • Standing, L., Conezio, J., & Haber, R. N. (1970). Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychonomic Science, 19(2), 73–74. doi:10.3758/BF03337426
  • Still, J. D., Cain, A. A., & Schuster, D. (2017). Human-centered authentication guidelines. Journal of Information and Computer Security.
  • Sun, H. M., Chen, S. T., Yeh, J. H., & Cheng, C. Y. (2016). A shoulder surfing resistant graphical authentication system. IEEE Transactions on Dependable and Secure Computing, 99: 1–14.
  • Suo, X., Zhu, Y., & Owen, G. S. (2005). Graphical passwords: A survey. In Computer Security Applications Conference, 21st Annual, Tucson, AZ, 463–472.
  • Uellenbeck, S., Dürmuth, M., Wolf, C., & Holz, T. (2013). Quantifying the security of graphical passwords: The case of android unlock patterns. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, 161–172.
  • Wiedenbeck, S., Waters, J., Sobrado, L., & Birget, J. C. (2006). Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proceedings of the Working Conference on Advanced Visual Interfaces, New York, NY, 177–184.
  • Yamamoto, T., Kojima, Y., & Nishigaki, M. (2009). A shoulder-surfing-resistant image-based authentication system with temporal indirect image selection. In Security and Management, Las Vegas, Nevada, 188–194.
  • Zakaria, N. H., Griffiths, D., Brostoff, S., & Yan, J. (2011). Shoulder surfing defense for recall-based graphical passwords. In Proceedings of the Seventh Symposium on Usable Privacy and Security, New York, NY, 6–18.
  • Zangooei, T., Mansoori, M., & Welch, I. (2012). A hybrid recognition and recall based approach in graphical passwords. In Proceedings of the 24th Australian Computer-Human Interaction Conference, Melbourne, VIC, Australia, 665–673.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.