Gibson et al., 2010 - Google Patents
Accessible and secure? Design constraints on image and sound based passwordsGibson et al., 2010
View PDF- Document ID
- 18109008761743893271
- Author
- Gibson M
- Conrad M
- Maple C
- Renaud K
- Publication year
- Publication venue
- 2010 International Conference on Information Society
External Links
Snippet
When members of society cannot access the World Wide Web, or the information and services it contains in a meaningful or useful way, they can become digitally excluded. Many factors have been highlighted as having an effect on the likelihood of exclusion, including …
- 230000000694 effects 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11194892B2 (en) | Authentication method and system | |
| US10839065B2 (en) | Systems and methods for assessing security risk | |
| US7552467B2 (en) | Security systems for protecting an asset | |
| De Luca et al. | Vibrapass: secure authentication based on shared lies | |
| US20100037313A1 (en) | Identification and Authentication using Public Templates and Private Patterns | |
| Tao | Pass-Go, a new graphical password scheme | |
| MXPA05011799A (en) | User authentication by combining speaker verification and reverse turing test. | |
| JP2005071202A (en) | System for mutual authentication between user and system | |
| Gugenheimer et al. | Colorsnakes: Using colored decoys to secure authentication in sensitive contexts | |
| JP2008537210A (en) | Secured data communication method | |
| Hayashi et al. | WebTicket: Account management using printable tokens | |
| De Luca et al. | Eyepass-eye-stroke authentication for public terminals | |
| Guerar et al. | Color wheel pin: Usable and resilient ATM authentication | |
| Alsaiari | Graphical one-time password authentication | |
| Gibson et al. | Accessible and secure? Design constraints on image and sound based passwords | |
| Desmarais | Body language, security and e‐commerce | |
| Ling et al. | Privacy enhancing keyboard: Design, implementation, and usability testing | |
| Farmand et al. | Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4) | |
| De Luca et al. | My phone is my keypad: privacy-enhanced pin-entry on public terminals | |
| Thorpe et al. | Video-passwords: Advertising while authenticating | |
| Su et al. | User biometric information‐based secure method for smart devices | |
| De Luca | Designing usable and secure authentication mechanisms for public spaces | |
| Blasko et al. | A wristwatch-computer based password-vault | |
| Sheil | Security, Privacy & Usability in Modern Web Services. | |
| Papanikolaou | Restricting Authentication Token Sharing: Holder-Binding |