Aiming to ensure safety of operation to application providers and improve the usability of human computer interactions during authentication, this paper proposes a two-step …
This paper studies the effect of individual differences in human cognition on user performance in authentication tasks. In particular, a text-based password and a recognition …
Stimulated by a large number of different theories on human cognition, suggesting that individuals have different habitual approaches in retrieving, recalling, processing and …
This paper investigates the interplay among human cognitive processing differences (field dependence vs. field independence), alternative interaction device types (desktop vs. touch) …
Authenticating users by means of passwords is still the dominant form of authentication despite its recognised weaknesses. To solve this, authenticating users with images or …
Research on human-computer interaction currently focuses on enhancing system usability by establishing an appropriate user interface (UI) that depends on users' features. Online …
JD Still, A Cain, D Schuster - Information & Computer Security, 2017 - emerald.com
Purpose Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been …
No existing user-authentication approaches provide universally strong user authentication, while also taking into account the human factors of good security design. A reevaluation is …
Graphical password composition is an important part of graphical user authentication which affects the strength of the chosen password. Considering that graphical authentication is …