2016
DOI: 10.11591/ijece.v6i6.pp2939-2948
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes

Abstract: <p>User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…It should be noted that the most used methods are listed by ISO / TR 16982: 2002 [19]. They are most often focused on the utility and usability criteria of the author [20] [21]. In this paper, we use the classification of authors [18], which classifies evaluation methods into 3 main approaches as shown in Figure 1: a.…”
Section: User Centered Evaluation Methodsmentioning
confidence: 99%
“…It should be noted that the most used methods are listed by ISO / TR 16982: 2002 [19]. They are most often focused on the utility and usability criteria of the author [20] [21]. In this paper, we use the classification of authors [18], which classifies evaluation methods into 3 main approaches as shown in Figure 1: a.…”
Section: User Centered Evaluation Methodsmentioning
confidence: 99%
“…There are several security levels which concerns in authentication like password schemes. Users have a tendency to use easy-to-remember passwords [22], [23], use the similar password for different accounts [3], and store these passwords on their systems insecurely, even if the case of strong password. This user may be vulnerable to threats especially family; thus forcing him to give the password to the enemy.…”
Section: Problem Statementmentioning
confidence: 99%
“…Most computer systems, Internet-based environments, and networks use password authentication [3]. Once a Password (PW) or One Time Password (OTP) which is valid for the only certain amount of time or one session [4] has been entered, the system looks up it in the password hash.…”
Section: Introductionmentioning
confidence: 99%
“…It is estimated that the worldwide usage of the most popular mobile device, smartphones, is expected to reach an estimated 3.8 billion and 40% of world population expected to own a smart phone by 2021 [ 1 ]. Smart devices are valuable devices not only because of their sophistication but also because they are used to store sensitive data like health, business, and financial information data [ 2 ]. Additionally, most social networking applications such as Facebook, Instagram, Snapchat, and WhatsApp can be accessed through these devices with internet connection.…”
Section: Introductionmentioning
confidence: 99%