[go: up one dir, main page]

Gibson et al., 2010 - Google Patents

Accessible and secure? Design constraints on image and sound based passwords

Gibson et al., 2010

View PDF
Document ID
18109008761743893271
Author
Gibson M
Conrad M
Maple C
Renaud K
Publication year
Publication venue
2010 International Conference on Information Society

External Links

Snippet

When members of society cannot access the World Wide Web, or the information and services it contains in a meaningful or useful way, they can become digitally excluded. Many factors have been highlighted as having an effect on the likelihood of exclusion, including …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
US11194892B2 (en) Authentication method and system
US10839065B2 (en) Systems and methods for assessing security risk
US7552467B2 (en) Security systems for protecting an asset
De Luca et al. Vibrapass: secure authentication based on shared lies
US20100037313A1 (en) Identification and Authentication using Public Templates and Private Patterns
Tao Pass-Go, a new graphical password scheme
MXPA05011799A (en) User authentication by combining speaker verification and reverse turing test.
JP2005071202A (en) System for mutual authentication between user and system
Gugenheimer et al. Colorsnakes: Using colored decoys to secure authentication in sensitive contexts
JP2008537210A (en) Secured data communication method
Hayashi et al. WebTicket: Account management using printable tokens
De Luca et al. Eyepass-eye-stroke authentication for public terminals
Guerar et al. Color wheel pin: Usable and resilient ATM authentication
Alsaiari Graphical one-time password authentication
Gibson et al. Accessible and secure? Design constraints on image and sound based passwords
Desmarais Body language, security and e‐commerce
Ling et al. Privacy enhancing keyboard: Design, implementation, and usability testing
Farmand et al. Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4)
De Luca et al. My phone is my keypad: privacy-enhanced pin-entry on public terminals
Thorpe et al. Video-passwords: Advertising while authenticating
Su et al. User biometric information‐based secure method for smart devices
De Luca Designing usable and secure authentication mechanisms for public spaces
Blasko et al. A wristwatch-computer based password-vault
Sheil Security, Privacy & Usability in Modern Web Services.
Papanikolaou Restricting Authentication Token Sharing: Holder-Binding