From hot-spots towards experience-spots: Leveraging on users' sociocultural experiences to enhance security in cued-recall graphical authentication

A Constantinides, C Fidas, M Belk, AM Pietron… - International Journal of …, 2021 - Elsevier
This paper suggests a novel cued-recall-based graphical authentication method, which
leverages on users' sociocultural experiences for improving the security and memorability of …

On designing usable and secure recognition-based graphical authentication mechanisms

M Mihajlov, B Jerman-Blažič - Interacting with Computers, 2011 - ieeexplore.ieee.org
In this article we present the development of a new, web-based, graphical authentication
mechanism called ImagePass. The authentication mechanism introduces a novel feature …

On sociocultural-centered graphical passwords: an initial framework

A Constantinides, C Fidas, M Belk… - Proceedings of the 20th …, 2018 - dl.acm.org
Graphical user authentication schemes typically require users to draw a secret on a
background image or select images on a grid. Although it is known that various image …

Sweet-spotting security and usability for intelligent graphical authentication mechanisms

M Belk, A Pamboris, C Fidas, C Katsini… - Proceedings of the …, 2017 - dl.acm.org
This paper investigates the trade-off between security and usability in recognition-based
graphical authentication mechanisms. Through a user study (N= 103) based on a real usage …

Graphical passwords: Behind the attainment of goals

A Vaddeti, D Vidiyala, V Puritipati… - Security and …, 2020 - Wiley Online Library
Graphical authentication methods have emerged as an alternative to the conventional
authentication methods over the past couple of decades. One of the most popular among …

A human-cognitive perspective of users' password choices in recognition-based graphical authentication

C Katsini, C Fidas, M Belk, G Samaras… - International Journal of …, 2019 - Taylor & Francis
Graphical password composition is an important part of graphical user authentication which
affects the strength of the chosen password. Considering that graphical authentication is …

Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations

A Constantinides, M Belk, C Fidas, R Beumers… - ACM Transactions on …, 2023 - dl.acm.org
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …

Balancing usability and security of graphical passwords

K Lapin, M Šiurkus - Conference on Multimedia, Interaction, Design and …, 2021 - Springer
Although most widely used authentication involves characters as passwords, but secure text-
based passwords are complex and difficult to remember. Users want to have easy to …

A rapid serial visual presentation method for graphical authentication

AA Cain, JD Still - Advances in Human Factors in Cybersecurity …, 2016 - Springer
Abstract We propose a Rapid Serial Visual Presentation (RSVP) graphical authentication
method that is suited for multi-touch mobile devices. This method presents degraded …

Why that picture? Discovering password properties in recognition-based graphical authentication

M Mihajlov, B Jerman-Blažič… - International Journal of …, 2016 - Taylor & Francis
Numerous graphical authentication ideas have been proposed on how to address the
security and usability of text-based passwords. However, it remains unclear how users …