A personalized user authentication approach based on individual differences in information processing

M Belk, C Fidas, P Germanakos… - Interacting with …, 2015 - ieeexplore.ieee.org
An effective user authentication mechanism should embrace both security and usability
aspects as its purpose is to ensure safety of operation of online services but as well usability …

A personalization method based on human factors for improving usability of user authentication tasks

M Belk, P Germanakos, C Fidas, G Samaras - User Modeling, Adaptation …, 2014 - Springer
Aiming to ensure safety of operation to application providers and improve the usability of
human computer interactions during authentication, this paper proposes a two-step …

Studying the effect of human cognition on user authentication tasks

M Belk, P Germanakos, C Fidas, G Samaras - User Modeling, Adaptation …, 2013 - Springer
This paper studies the effect of individual differences in human cognition on user
performance in authentication tasks. In particular, a text-based password and a recognition …

Security for diversity: Studying the effects of verbal and imagery processes on user authentication mechanisms

M Belk, C Fidas, P Germanakos, G Samaras - … Interaction–INTERACT 2013 …, 2013 - Springer
Stimulated by a large number of different theories on human cognition, suggesting that
individuals have different habitual approaches in retrieving, recalling, processing and …

The interplay between humans, technology and user authentication: A cognitive processing perspective

M Belk, C Fidas, P Germanakos, G Samaras - Computers in Human …, 2017 - Elsevier
This paper investigates the interplay among human cognitive processing differences (field
dependence vs. field independence), alternative interaction device types (desktop vs. touch) …

A study of graphical alternatives for user authentication

MZ Jali - 2011 - pearl.plymouth.ac.uk
Authenticating users by means of passwords is still the dominant form of authentication
despite its recognised weaknesses. To solve this, authenticating users with images or …

Using interface preferences as evidence of user identity: A feasibility study

N Karim, W Abdulraheem, H Kanaker… - … Journal of Data and …, 2024 - m.growingscience.com
Research on human-computer interaction currently focuses on enhancing system usability
by establishing an appropriate user interface (UI) that depends on users' features. Online …

Human-centered authentication guidelines

JD Still, A Cain, D Schuster - Information & Computer Security, 2017 - emerald.com
Purpose Despite the widespread use of authentication schemes and the rapid emergence of
novel authentication schemes, a general set of domain-specific guidelines has not yet been …

[图书][B] Transparent user authentication: biometrics, RFID and behavioural profiling

N Clarke - 2011 - books.google.com
No existing user-authentication approaches provide universally strong user authentication,
while also taking into account the human factors of good security design. A reevaluation is …

A human-cognitive perspective of users' password choices in recognition-based graphical authentication

C Katsini, C Fidas, M Belk, G Samaras… - International Journal of …, 2019 - Taylor & Francis
Graphical password composition is an important part of graphical user authentication which
affects the strength of the chosen password. Considering that graphical authentication is …