A Secure Usability Design System for User Authentication

被引:0
|
作者
Olanrewaju, Ayannuga O. [1 ]
Olusegun, Folorunso [2 ]
Adio, Akinwale T. [2 ]
Asiribo, E. O. [3 ]
机构
[1] Yaba Coll Technol, Dept Comp Technol, Lagos, Nigeria
[2] Univ Agr Abeokuta, Dept Comp Sci, Abeokuta, Ogun State, Nigeria
[3] Univ Agr Abeokuta, Dept Stat, Abeokuta, Ogun State, Nigeria
关键词
Authentication; Graphical Password; Security; Text Password and Usability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The term usable authentication is been brought about as a result of issues surrounding user memorabiilty. Computer users find it less easy to memorize plain text password compared to images or graphics. Researchers have over the years presented several authentication schemes in an effort to provide users with a usable and yet secure authentication system. Authentication and usability are two important terms that to a large extent determines how good a security system is. Secure systems are often needed in many organizations to keep privacy, ensure data safety, among many others. Though it is a necessity for such systems to be very secure but one thing often neglected by most developers is the user. When a system is too secure that it often leads to circumventing of the system by the users, then such a system is not usable. This paper takes a close look at how usability and authentication can be balanced with the use of graphical passwords by presenting an authentication system that combines the use of text based password and graphics based password. The combined strengths of these schemes present computer users with a secure yet usable authentication scheme.
引用
收藏
页码:151 / 158
页数:8
相关论文
共 50 条
  • [21] Finger ECG Signal for User Authentication: Usability and Performance
    da Silva, Hugo Placido
    Lourenco, Andre
    Fred, Ana
    Jain, Anil K.
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2013,
  • [22] Secure speech biometric templates for user authentication
    Inthavisas, K.
    Lopresti, D.
    IET BIOMETRICS, 2012, 1 (01) : 46 - 54
  • [23] Secure store of user authentication tokens in multi-cloud storage system
    Sun, Jinjin
    Xu, Ming
    Feng, Shifang
    Li, Zhongwei
    Wang, Gang
    Liu, Xiaoguang
    Journal of Computational Information Systems, 2015, 11 (03): : 1013 - 1020
  • [24] Device Parameter based Secure User Authentication
    Tsai, Kun-Lin
    Leu, Fang-Yie
    Yip, King-Shing
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 721 - 730
  • [25] More secure remote user authentication scheme
    Kim, Sang-Kyun
    Chung, Min Gyo
    COMPUTER COMMUNICATIONS, 2009, 32 (06) : 1018 - 1021
  • [26] A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System
    Wen, Fengtong
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
  • [27] A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System
    Fengtong Wen
    Journal of Medical Systems, 2014, 38
  • [28] Secure EEG-Based User Authentication System Integrated with Robust Watermarking
    Pham Duy Trung
    Nguyen Nhat Hai
    Nguyen Thi Hong Ha
    SOICT 2019: PROCEEDINGS OF THE TENTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, : 242 - 247
  • [29] AudioAuth: Exploring the Design and Usability of a Sound-Based Authentication System
    Said, Karim
    Kuber, Ravi
    Murphy, Emma
    INTERNATIONAL JOURNAL OF MOBILE HUMAN COMPUTER INTERACTION, 2015, 7 (04) : 16 - 34
  • [30] Design and Implementation of an IoT Based Secure Biometric Authentication System
    Joshy, Annies
    Jalaja, M. J.
    2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2017,