Proceedings of the 3rd Symposium on Usable Privacy and Security 2007
DOI: 10.1145/1280680.1280682
|View full text |Cite
|
Sign up to set email alerts
|

A second look at the usability of click-based graphical passwords

Abstract: Click-based graphical passwords, which involve clicking a set of user-selected points, have been proposed as a usable alternative to text passwords. We conducted two user studies: an initial lab study to revisit these usability claims, explore for the first time the impact on usability of a wide-range of images, and gather information about the points selected by users; and a large-scale field study to examine how click-based graphical passwords work in practice. No such prior field studies have been reported … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

9
134
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 125 publications
(143 citation statements)
references
References 8 publications
9
134
0
Order By: Relevance
“…These results compare well with earlier work such as PassPoints [21], which yielded mean ratification times of 8.78-24.25s and 1.55-2.75 failed ratification attempts prior to successfully entering a cipher. Similarly, Chiasson et al [6] present a lab study of click-point-based graphical ciphers using multiple images and report a median ratification time of 7s and an error rate of 6%. In summary, this paper proposed improving the security of graphical cipher systems by integrating live display of a graphical object that a user picks.…”
Section: Discussionmentioning
confidence: 96%
See 3 more Smart Citations
“…These results compare well with earlier work such as PassPoints [21], which yielded mean ratification times of 8.78-24.25s and 1.55-2.75 failed ratification attempts prior to successfully entering a cipher. Similarly, Chiasson et al [6] present a lab study of click-point-based graphical ciphers using multiple images and report a median ratification time of 7s and an error rate of 6%. In summary, this paper proposed improving the security of graphical cipher systems by integrating live display of a graphical object that a user picks.…”
Section: Discussionmentioning
confidence: 96%
“…As variations in tokens are inevitable with the Graphical Cipher Ratification System's setup, we also explored the robustness of the system in the case of repeated images with different point selections. 1) Materials: Five source images were selected based on the image categories with highest success rate in prior work [6]. They depicted people, food, tiny objects, and random text.…”
Section: Evaluation a Reliability Studymentioning
confidence: 99%
See 2 more Smart Citations
“…Recent field studies of security software have mostly involved evaluating the use of authentication mechanisms [3,6,4]. In 2009, Somayaji et al [11] introduced the concept of computer security clinical trials.…”
Section: Introductionmentioning
confidence: 99%