The design and analysis of graphical passwords

被引:0
|
作者
Jermyn, I [1 ]
Mayer, A [1 ]
Monrose, F [1 ]
Reiter, MK [1 ]
Rubin, AD [1 ]
机构
[1] NYU, New York, NY 10012 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we propose and evaluate new graphical password schemes that exploit features of graphical input displays to achieve better security than text-based passwords. Graphical input devices enable the user to decouple the position of inputs from the temporal order in which those inputs occur, and we show that this decoupling can be used to generate password schemes with substantially larger (memorable) password spaces. In order to evaluate the security of one of our schemes, we devise a novel way to capture a subset of the "memorable" passwords that, we believe, is itself a contribution. In this work we are primarily motivated by devices such as personal digital assistants (PDAs) that offer graphical input capabilities via a stylus, and we describe our prototype implementation of one of our password schemes on such a PDA, namely the Palm Pilot(TM).
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [41] Implementation of Graphical Passwords in Internet Banking for Enhanced Security
    Razvi, Salma Abid
    Neelima, S.
    Prathyusha, C.
    Yuvasree, G.
    Ganga, C.
    Kumar, K. Manoj
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 35 - 41
  • [42] On Automated Image Choice for Secure and Usable Graphical Passwords
    Dunphy, Paul
    Olivier, Patrick
    [J]. 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 99 - 108
  • [43] Guessing Click-Based Graphical Passwords by Eye Tracking
    LeBlanc, Daniel
    Forget, Alain
    Biddle, Robert
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 197 - 204
  • [44] Universal Multi-Factor Authentication Using Graphical Passwords
    Sabzevar, Alireza Pirayesh
    Stavrou, Angelos
    [J]. SITIS 2008: 4TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY AND INTERNET BASED SYSTEMS, PROCEEDINGS, 2008, : 625 - 632
  • [45] Graphical passwords using images with random tracks of geometric shapes
    Lin, Phen-Lan
    Weng, Li-Tung
    Huang, Po-Whei
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, : 27 - +
  • [46] GridMap: Enhanced Security in Cued-Recall Graphical Passwords
    Van Balen, Nicolas
    Wang, Haining
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 75 - 94
  • [47] On Purely Automated Attacks and Click-Based Graphical Passwords
    Salehi-Abari, Amirali
    Thorpe, Julie
    van Oorschot, P. C.
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 111 - 120
  • [48] Memorability of Cued-Recall Graphical Passwords with Saliency Masks
    Alt, Florian
    Mikusz, Mateusz
    Schneegass, Stefan
    Bulling, Andreas
    [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS MULTIMEDIA (MUM 2016), 2016, : 191 - 200
  • [49] Purely Automated Attacks on PassPoints-Style Graphical Passwords
    van Oorschot, Paul C.
    Salehi-Abari, Amirali
    Thorpe, Julie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (03) : 393 - 405
  • [50] A remote user authentication scheme using strong graphical passwords
    Ku, WC
    Tsaur, MJ
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 351 - 355