2011 IEEE Symposium on Security and Privacy 2011
DOI: 10.1109/sp.2011.35
|View full text |Cite
|
Sign up to set email alerts
|

Using Fingerprint Authentication to Reduce System Security: An Empirical Study

Abstract: Choosing the security architecture and policies for a system is a demanding task that must be informed by an understanding of user behavior. We investigate the hypothesis that adding visible security features to a system increases user confidence in the security of a system and thereby causes users to reduce how much effort they spend in other security areas. In our study, 96 volunteers each created a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 28 publications
(10 reference statements)
0
17
0
Order By: Relevance
“…Password research has consistently been limited by the difficulty of studying passwords used for high-value accounts. Lab studies have asked participants to create passwords that protect simulated accounts, $5, a chance to win an iPod in a raffle, or access to university course materials including homework and grades [9,11,26,49]. Other studies have relied on the leaked password lists like the RockYou set [42,46].…”
Section: Introductionmentioning
confidence: 99%
“…Password research has consistently been limited by the difficulty of studying passwords used for high-value accounts. Lab studies have asked participants to create passwords that protect simulated accounts, $5, a chance to win an iPod in a raffle, or access to university course materials including homework and grades [9,11,26,49]. Other studies have relied on the leaked password lists like the RockYou set [42,46].…”
Section: Introductionmentioning
confidence: 99%
“…This method gave 97.99% accuracy rate of verification by using IITK database. Hugh Wimberly et al, [23] told that Password is the weakest portion of many important systems. They made 96 employees to register in two accounts each and then made a survey how strong the passwords are.They made a proposal for verifying users by their biometrics.…”
Section: Literature Surveymentioning
confidence: 99%
“…For instance, if the embedding algorithm remains unknown, the service provider can look for the appropriate standard watermark to check that a submitted image was indeed generated by a trusted machine (or sensor). Nonetheless, Replay attacks have been addressed using datahiding techniques [33] to secretly embed a telltale mark directly in the compressed fingerprint image.…”
Section: Fingerprint Recognitionmentioning
confidence: 99%