Access the full text.
Sign up today, get DeepDyve free for 14 days.
E. Zezschwitz, A. Luca, H. Hussmann (2014)
Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performanceProceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational
Eiji Hayashi, Bryan Pendleton, F. Ozenc, Jason Hong (2012)
WebTicket: account management using printable tokensProceedings of the SIGCHI Conference on Human Factors in Computing Systems
A. Demetriou, G. Spanoudis, M. Shayer, Antigoni Mouyi, Smaragda Kazi, Maria Platsidou (2013)
Cycles in speed-working memory-G relations: Towards a developmental–differential theory of the mindIntelligence, 41
Arif Altun, Mehtap Cakan (2006)
Undergraduate Students\u2019 Academic Achievement, Field Dependent/Independent Cognitive Styles and Attitude toward ComputersJ. Educ. Technol. Soc., 9
(2000)
This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication
Nicholas Wright, Andrew Patrick, R. Biddle (2012)
Do you see your password?: applying recognition to textual passwords
Deborah Nelson, K. Vu (2010)
Effectiveness of image-based mnemonic techniques for enhancing the memorability and security of user-generated passwordsComput. Hum. Behav., 26
A. Luca, E. Zezschwitz, L. Pichler, H. Hussmann (2013)
Using fake cursors to secure on-screen password entryProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Philip Inglesant, M. Sasse (2010)
The true cost of unusable password policies: password use in the wildProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Hai Tao, C. Adams (2008)
Pass-Go: A Proposal to Improve the Usability of Graphical PasswordsInt. J. Netw. Secur., 7
Jeff Yan, A. Ahmad (2008)
A low-cost attack on a Microsoft captchaProceedings of the 15th ACM conference on Computer and communications security
E. Zezschwitz, A. Luca, Bruno Brunkow, H. Hussmann (2015)
SwiPIN: Fast and Secure PIN-Entry on SmartphonesProceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
S. Vikram, Yinan Fan, G. Gu (2011)
SEMAGE: a new image-based two-factor CAPTCHA
Elie Bursztein, Steven Bethard, C. Fabry, John Mitchell, Dan Jurafsky (2010)
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation2010 IEEE Symposium on Security and Privacy
C. Kuo, Sasha Romanosky, L. Cranor (2006)
Human selection of mnemonic phrase-based passwords
L. Ahn, Benjamin Maurer, Colin McMillen, David Abraham, M. Blum (2008)
reCAPTCHA: Human-Based Character Recognition via Web Security MeasuresScience, 321
P. Golle (2008)
Machine learning attacks against the Asirra CAPTCHAProceedings of the 15th ACM conference on Computer and communications security
R. Proctor, M. Lien, K. Vu, E. Schultz, G. Salvendy (2002)
Improving computer security for authentication of users: Influence of proactive password restrictionsBehavior Research Methods, Instruments, & Computers, 34
Paul Baecher, Niklas Büscher, M. Fischlin, Benjamin Milde (2011)
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition
S. Chiasson, P. Oorschot, R. Biddle (2006)
A Usability Study and Critique of Two Password Managers
Albert Jeng, C. Tseng, Der-Feng Tseng, Jiunn-Chin Wang (2010)
A Study of CAPTCHA and Its Application to User Authentication
Vicki Hanson, A. Sears (2011)
Introduction ASSETS’10 Special IssueACM Trans. Access. Comput., 4
K. Renaud, Peter Mayer, M. Volkamer, Joseph Maguire (2013)
Are graphical authentication mechanisms as strong as passwords?2013 Federated Conference on Computer Science and Information Systems
Darren Davis, F. Monrose, M. Reiter (2004)
On User Choice in Graphical Password Schemes
Saranga Komanduri, Richard Shay, Patrick Kelley, Michelle Mazurek, Lujo Bauer, Nicolas Christin, L. Cranor, Serge Egelman (2011)
Of passwords and people: measuring the effect of password-composition policiesProceedings of the SIGCHI Conference on Human Factors in Computing Systems
A. Bulling, Florian Alt, A. Schmidt (2012)
Increasing the security of gaze-based cued-recall graphical passwords using saliency masksProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Steven Ross, J. Halderman, Adam Finkelstein (2010)
Sketcha: a captcha based on line drawings of 3D models
Richard Shay, Lujo Bauer, Nicolas Christin, L. Cranor, Alain Forget, Saranga Komanduri, Michelle Mazurek, William Melicher, Sean Segreti, Blase Ur (2015)
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation BehaviorProceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
R. Gossweiler, Maryam Kamvar, S. Baluja (2009)
What's up CAPTCHA?: a CAPTCHA based on image orientation
Sherry Chen, Xiaohui Liu (2008)
An Integrated Approach for Modeling Learning Patterns of Students in Web-Based Instruction: A Cognitive Style PerspectiveACM Trans. Comput. Hum. Interact., 15
K. Vu, R. Proctor, Abhilasha Bhargav-Spantzel, Bik-Lam Tai, Joshua Cook, E. Schultz (2007)
Improving password security and memorability to protect personal and organizational informationInt. J. Hum. Comput. Stud., 65
Marc Walker, J. Halderman, Brent Waters, E. Felten (2005)
A convenient method for securely managing passwords
L. Cranor, S. Garfinkel (2005)
Security and Usability
Luis Ahn, M. Blum, J. Langford (2004)
Telling humans and computers apart automaticallyCommun. ACM, 47
A. Adams, M. Sasse (1999)
Users are not the enemyCommun. ACM, 42
Richard Shay, Saranga Komanduri, Patrick Kelley, P. Leon, Michelle Mazurek, Lujo Bauer, Nicolas Christin, L. Cranor (2010)
Encountering stronger password requirements: user attitudes and behaviors
Alain Forget, S. Chiasson, P. Oorschot, R. Biddle (2008)
Improving text passwords through persuasion
Yao Ma, Jinjuan Feng, L. Kumin, J. Lazar (2013)
Investigating User Behavior for Authentication Methods: A Comparison between Individuals with Down Syndrome and Neurotypical UsersACM Trans. Access. Comput., 4
J. Holman, J. Lazar, Jinjuan Feng, J. D'Arcy (2007)
Developing usable CAPTCHAs for blind users
C. Fidas, A. Voyiatzis, N. Avouris (2011)
On the necessity of user-friendly CAPTCHAProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Marios Belk, C. Fidas, Panagiotis Germanakos, G. Samaras (2015)
Do human cognitive differences in information processing affect preference and performance of CAPTCHA?Int. J. Hum. Comput. Stud., 84
Marios Belk, C. Fidas, Panagiotis Germanakos, G. Samaras (2015)
A Personalized User Authentication Approach Based on Individual Differences in Information ProcessingInteract. Comput., 27
Bin Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, N. Xu, Meng Yi, Kaiwei Cai (2010)
Attacks and design of image recognition CAPTCHAs
Marios Belk, Panagiotis Germanakos, C. Fidas, G. Samaras (2014)
A Personalization Method Based on Human Factors for Improving Usability of User Authentication Tasks
R. Biddle, S. Chiasson, P. Oorschot (2012)
Graphical passwords: Learning from the first twelve yearsACM Comput. Surv., 44
C. Varenhorst, M. Kleek, L. Rudolph (2004)
Passdoodles; a Lightweight Authentication Method
Y. Rui, Zicheng Liu (2003)
ARTiFACIAL: Automated Reverse Turing test using FACIAL featuresMultimedia Systems, 9
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, N. Memon (2005)
Authentication using graphical passwords: effects of tolerance and image choice
Marios Belk, Panagiotis Germanakos, C. Fidas, Andreas Holzinger, G. Samaras (2013)
Towards the Personalization of CAPTCHA Mechanisms Based on Individual Differences in Cognitive Processing
Alain Forget, R. Biddle (2008)
Memorability of persuasive passwordsCHI '08 Extended Abstracts on Human Factors in Computing Systems
Efi Papatheocharous, Marios Belk, Panagiotis Germanakos, G. Samaras (2014)
Towards Implicit User Modeling Based on Artificial Intelligence, Cognitive Styles and Web Interaction DataInt. J. Artif. Intell. Tools, 23
Joseph Bonneau, Cormac Herley, P. Oorschot, F. Stajano (2012)
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes2012 IEEE Symposium on Security and Privacy
T. Tullis, Donna Tedesco, Kate McCaffrey (2011)
Can users remember their pictorial passwords six years laterCHI '11 Extended Abstracts on Human Factors in Computing Systems
Marios Belk, C. Fidas, Panagiotis Germanakos, G. Samaras (2013)
Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms
M. Mihajlov, B. Jerman-Blazic (2011)
On designing usable and secure recognition-based graphical authentication mechanismsInteract. Comput., 23
Katherine Everitt, Tanya Bragin, J. Fogarty, Tadayoshi Kohno (2009)
A comprehensive study of frequency, interference, and training of multiple graphical passwordsProceedings of the SIGCHI Conference on Human Factors in Computing Systems
J. Elson, John Douceur, Jon Howell, J. Saul (2007)
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization
Ting-Wen Chang, M. El-Bishouty, S. Graf, Kinshuk (2013)
An Approach for Detecting Students' Working Memory Capacity from Their Behavior in Learning Systems2013 IEEE 13th International Conference on Advanced Learning Technologies
Elie Bursztein, Matthieu Martin, John Mitchell (2011)
Text-based CAPTCHA strengths and weaknesses
Cormac Herley, P. Oorschot, Andrew Patrick (2009)
Passwords: If We're So Smart, Why Are We Still Using Them?
Ian Jermyn, A. Mayer, F. Monrose, M. Reiter, A. Rubin (1999)
The Design and Analysis of Graphical Passwords
C. Fidas, A. Voyiatzis, N. Avouris (2010)
When Security Meets Usability: A User-Centric Approach on a Crossroads Priority Problem2010 14th Panhellenic Conference on Informatics
Chu-Han Chan, Chen-Wei Hsieh, Sherry Chen (2014)
Cognitive styles and the use of electronic journals in a mobile contextJ. Documentation, 70
C. Fidas, H. Hussmann, Marios Belk, G. Samaras (2015)
iHIP: Towards a User Centric Individual Human Interaction Proof FrameworkProceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
Richard Shay, Patrick Kelley, Saranga Komanduri, Michelle Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, L. Cranor (2012)
Correct horse battery staple: exploring the usability of system-assigned passphrases
Jong-Chao Hong, Ming-Yueh Hwang, Ker-Ping Tam, Yi-Hsuan Lai, Li-Chun Liu (2012)
Effects of cognitive style on digital jigsaw puzzle performance: A GridWare analysisComput. Hum. Behav., 28
S. Chiasson, Alain Forget, R. Biddle, P. Oorschot (2008)
Influencing users towards better passwords: persuasive cued click-points
Leah Findlater, J. Wobbrock, Daniel Wigdor (2011)
Typing on flat glass: examining ten-finger expert typing patterns on touch surfacesProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Paul Dunphy, Jeff Yan (2007)
Do background images improve "draw a secret" graphical passwords?
Marios Belk, Panagiotis Germanakos, C. Fidas, G. Samaras (2013)
Studying the Effect of Human Cognition on User Authentication Tasks
Marios Belk, C. Fidas, Panagiotis Germanakos, G. Samaras (2012)
Do cognitive styles of users affect preference and performance related to CAPTCHA challenges?CHI '12 Extended Abstracts on Human Factors in Computing Systems
K. Chellapilla, K. Larson, P. Simard, M. Czerwinski (2005)
Designing human friendly human interaction proofs (HIPs)Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
R. Datta, Jia Li, James Wang (2005)
IMAGINATION: a robust image-based CAPTCHA generation system
M. Kozhevnikov (2007)
Cognitive styles in the context of modern psychology: toward an integrated framework of cognitive style.Psychological bulletin, 133 3
R. Riding, I. Cheema (1991)
Cognitive Styles—an overview and integrationEducational Psychology, 11
James Nicholson, Paul Dunphy, L. Coventry, P. Briggs, P. Olivier (2012)
A security assessment of tiles: a new portfolio-based graphical authentication systemCHI '12 Extended Abstracts on Human Factors in Computing Systems
A. Kobsa, Rishab Nithyanand, G. Tsudik, E. Uzun (2013)
Can Jannie verify? Usability of display-equipped RFID tags for security purposesJ. Comput. Secur., 21
Marios Belk, Efi Papatheocharous, Panagiotis Germanakos, G. Samaras (2013)
Modeling users on the World Wide Web based on cognitive factors, navigation behavior and clustering techniquesJ. Syst. Softw., 86
Elie Bursztein, A. Moscicki, C. Fabry, Steven Bethard, John Mitchell, Dan Jurafsky (2014)
Easy does it: more usable CAPTCHAsProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Gerardo Reynaga, S. Chiasson (2013)
The usability of CAPTCHAs on smartphones2013 International Conference on Security and Cryptography (SECRYPT)
Cormac Herley, P. Oorschot (2012)
A Research Agenda Acknowledging the Persistence of PasswordsIEEE Security & Privacy, 10
Christian Winkler, Jan Gugenheimer, A. Luca, Gabriel Haas, Philipp Speidel, D. Dobbelstein, E. Rukzio (2015)
Glass Unlock: Enhancing Security of Smartphone Unlocking through Leveraging a Private Near-eye DisplayProceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
Michael Leonhard, V. Venkatakrishnan (2007)
A comparative study of three random password generators2007 IEEE International Conference on Electro/Information Technology
S. Messick (1993)
The Matter of Style: Manifestations of Personality in Cognition, Learning, and Teaching. Research Report.
Haichang Gao, Honggang Liu, Dan Yao, Xiyang Liu, U. Aickelin (2010)
An Audio CAPTCHA to Distinguish Humans from Computers2010 Third International Symposium on Electronic Commerce and Security
Jeff Yan, A. Blackwell, Ross Anderson, Alasdair Grant (2004)
Password memorability and security: empirical resultsIEEE Security & Privacy Magazine, 2
Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wang, Xiyang Liu (2008)
YAGP: Yet Another Graphical Password Strategy2008 Annual Computer Security Applications Conference (ACSAC)
D. Florêncio, Cormac Herley (2007)
A large-scale study of web password habits
S. Shirali-Shahreza, Gerald Penn, Ravin Balakrishnan, Y. Ganjali (2013)
SeeSay and HearSay CAPTCHA for mobile interactionProceedings of the SIGCHI Conference on Human Factors in Computing Systems
A. Angeli, L. Coventry, G. Johnson, K. Renaud (2005)
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systemsInt. J. Hum. Comput. Stud., 63
Jeffrey Bigham, Anna Cavender (2009)
Evaluating existing audio CAPTCHAs and an interface optimized for non-visual useProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Tsz-Yan Chan (2003)
Using a test-to-speech synthesizer to generate a reverse Turing testProceedings. 15th IEEE International Conference on Tools with Artificial Intelligence
Monica Chew, H. Baird (2003)
BaffleText: a Human Interactive Proof, 5010
Kurt Kluever, R. Zanibbi (2009)
Balancing usability and security in a video CAPTCHA
[Security mechanisms are of critical importance in today’s interactive systems. While the primary goal of such mechanisms is to preserve security of information and premises, researchers and practitioners have come to understand the critical importance of usable security which is an area focusing on how to design and develop security mechanisms that respect human performance and their goals within an interactive system. Motivated by recent research works that underpinned the necessity of usability in security mechanisms, in this chapter we present an alternative approach to current state-of-the-art practices with the aim to achieve a balance between usability and security of two widely deployed and critical security mechanisms. In particular, we propose a set of human-centred design guidelines for adapting and personalizing user authentication and CAPTCHA mechanisms. Our intention is to provide the most optimized condition, in terms of design type and complexity level, based on specific human cognitive factors. The reader can further realize the adaptation effects and added value of this approach through a user study that investigated user interactions on given security tasks. According to these, the personalized condition of the user security tasks significantly improved task completion performance compared to the non-personalized one. Results of a post-study qualitative survey analysis also revealed that users perceived the improved usability of the personalized condition.]
Published: Feb 20, 2016
Keywords: User authentication; CAPTCHA; Design; Guidelines; User study
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.