The Password Authentication from the User's Perspective

被引:0
|
作者
Hub, Miloslav [1 ]
机构
[1] Univ Pardubice, Fac Econ & Adm, Pardubice, Czech Republic
关键词
password; authentication; usability; usability engineering;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
The goal of this paper is to evaluate the password authentication from the end user's point of view with respect to the ability of these users. Firstly, requirements to usable passwords are defined in accordance with usability engineering terminology, concretely learnability, efficiency, memorability, satisfaction and errors of a password. Then, through an experimental study the factors that affect various aspects of passwords usability are investigated. The goal of this experimental study was to investigate the trade-off between security and memorability in the real world context and to investigate whether the education of end users regarding the creation of secure passwords affects the security of their passwords. The participants were divided to six sub-groups according to whether they were or were not trained about passwords security and according to instructions how they were expected to choose their passwords. Data obtained through this controlled experiment are analysed and based on this analysis there are formulated conclusions in this paper.
引用
收藏
页码:375 / 383
页数:9
相关论文
共 50 条
  • [1] User's authentication in media services by using one-time password authentication scheme
    Wang, Neng-Wen
    Huang, Yueh-Min
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 623 - +
  • [2] User-Side Password Authentication: A Study
    Sarga, Libor
    Jasek, Roman
    [J]. PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 237 - 243
  • [3] User authentication by secured graphical password implementation
    Bandyopadhyay, Samir Kumar
    Bhattacharyya, Debnath
    Das, Poulami
    [J]. 2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, 2008, : 7 - +
  • [4] Neuromuscular Password-Based User Authentication
    Jiang, Xinyu
    Xu, Ke
    Liu, Xiangyu
    Dai, Chenyun
    Clifton, David A.
    Clancy, Edward A.
    Akay, Metin
    Chen, Wei
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) : 2641 - 2652
  • [5] An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem
    Ranjan, Pratik
    Om, Hari
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (01) : 217 - 244
  • [6] An Efficient Remote User Password Authentication Scheme based on Rabin’s Cryptosystem
    Pratik Ranjan
    Hari Om
    [J]. Wireless Personal Communications, 2016, 90 : 217 - 244
  • [7] oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks
    Sun, Hung-Min
    Chen, Yao-Hsin
    Lin, Yue-Hsun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 651 - 663
  • [8] ProcurePass: A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack
    Kassim, Mariam M.
    Sujitha, A.
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2013, : 31 - 34
  • [9] Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol
    Hoelbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (10) : 1945 - 1951
  • [10] The password is dead, long live the password - A laboratory study on user perceptions of authentication schemes
    Zimmermann, Verena
    Gerber, Nina
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2020, 133 : 26 - 44