Feature Support Order Evaluation Technique on User Own Image in Multifactor Authentication
Abstract
Keywords
Full Text:
PDFReferences
. A. Adams and M. Sasse, “Users are not the enemy,” Commun.ACM, vol. 42, pp. 40–46, 1999.
. M. Adham, A. Azodi, Y. Desmedt, and I. Karaolis, “How to attack twofactor authentication internet banking,” in Proc. 17th Int. Conf. FinancialCryptography, 2013, pp. 322–328.
. ARTigo, http://www.artigo.org/.
. F. Aloul, S. Zahidi, and W. El-Hajj, “Two factor authentication using mobile phones,” Proc. Comput. Syst. Appl., 2009, pp. 641–644.
. R. Biddle, S. Chiasson, and P. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys vol. 44, no. 4, p. 19, 2012.
. G. E. Blonder, “Graphical passwords,” U.S. Patent 5 559 961, 1996.
. J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “The quest to replace passwords: A framework for comparative evaluation of web authentication schemes,” in Proc. IEEE Symp. Security Privacy, 2012, pp. 553–567.
. S.Chiasson, R. Biddle, and P. van Oorschot, “Asecond look at the usability of click-based graphical passwords,” in Proc. 3rd Symp. Usable PrivacySecurity, 2007, pp. 1–12.
. S. Chiasson, P. C. van Oorschot, and R. Biddle, “Graphical password authentication using cued click points,” in Proc. 12th Eur. Symp. Res.Comput. Security, 2007, pp. 359–374.
. S. Chiasson, A. Forget, R. Biddle, and P. C. Oorschot, “User interface design affects security: Patterns in click-based graphical passwords, Int.J. Inf. Security, vol. 8, no. 6, pp. 387–398, 2009.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.