Filters








2,388 Hits in 6.1 sec

Usability and security evaluation of GeoPass

Julie Thorpe, Brent MacRae, Amirali Salehi-Abari
2013 Proceedings of the Ninth Symposium on Usable Privacy and Security - SOUPS '13  
We design, implement, and evaluate GeoPass: an interface for digital map-based authentication where a user chooses a place as his or her password (i.e., a "location-password").  ...  The results of our user study found that 97% of users were able to remember their location-password over the span of 8-9 days and most without any failed login attempts.  ...  We thank the participants of our user study. We are grateful to Apu Kapadia, Stuart Schechter, and the anonymous reviewers for their insightful suggestions for improving this paper.  ... 
doi:10.1145/2501604.2501618 dblp:conf/soups/ThorpeMS13 fatcat:7evad3b3wjdcpbmemwyxrot2ae

A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation

Kemal Bicakci, Paul C. van Oorschot
2011 Proceedings of the 2011 workshop on New security paradigms workshop - NSPW '11  
First, we introduce and give a technical description of gridWord, a novel knowledge-based authentication mechanism involving elements of both text and graphical passwords.  ...  While the core ideas behind gridWord are well-formed, and may be viewed as a new variation of old (text-based) ideas of building passwords from multiple words, many aspects including recommended parameterization  ...  The second author is Canada Research Chair in Authentication and Software Security, and acknowledges NSERC for funding the chair, a Discovery Grant, and a Discovery Accelerator Supplement.  ... 
doi:10.1145/2073276.2073280 dblp:conf/nspw/BicakciO11 fatcat:f6g4xbpnfje2jdtesl3xucaqke

A second look at the usability of click-based graphical passwords

Sonia Chiasson, Robert Biddle, P. C. van Oorschot
2007 Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07  
We also present a first look at whether interference from having multiple graphical passwords affects usability and whether more memorable passwords are necessarily weaker from a security point of view  ...  Click-based graphical passwords have been proposed as a usable alternative to text passwords.  ...  ACKNOWLEDGMENTS We thank Julie Thorpe for her collaboration in this project, the participants of our lab study, and Prosenjit Bose, Louis D.  ... 
doi:10.1145/1280680.1280682 dblp:conf/soups/ChiassonBO07 fatcat:dertfjgdp5hbnfwuryeiimu5tq

Camera Based Two Factor Authentication Through Mobile and Wearable Devices

Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar
2017 Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies  
In a user study with 42 participants over 8 days in 3 sessions we found that Pixie outperforms text based passwords on memorability, speed, and user preference.  ...  A quick and familiar user action of snapping a photo is sufficient for Pixie to simultaneously perform a graphical password authentication and a physical token based authentication, yet it does not require  ...  USER STUDY We have used a lab study to evaluate the usability of Pixie's trinket based authentication and compared it against text-based passwords.  ... 
doi:10.1145/3131904 fatcat:oyuh3wmtfrhd7gjxiczp7apneu

Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication

Kevin Juang, Joel Greenstein
2018 Human Factors  
Based on a pilot study, we settled on ten rows of text as a tradeoff between security and usability.  ...  The correct input text is automatically mapped to a certain color and position, which are tied together for redundancy.  ... 
doi:10.1177/0018720818767683 pmid:29718722 fatcat:lndojismcfedxdzfwyr4tcxy2q

What You See is Not What You Get

Yan Li, Yao Cheng, Yingjiu Li, Robert H. Deng
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
In this paper, we propose a series of leakage-resilient password entry schemes on stand-alone smart glasses, which are gTapper, gRotator, and gTalker.  ...  The results of our user study reveal that the proposed schemes are easy-to-use so that users enter their passwords within moderate time, at high accuracy, and in various situations.  ...  Finally, gTalker recognizes the number s ik spoken by the user and enters p k based the mapping between the original keypad and the transformed keypad in that round.  ... 
doi:10.1145/3052973.3053042 dblp:conf/ccs/LiCLD17 fatcat:z5g3r5vxqjgtjkyj4sijdhhv5y

Performance Evaluation of Different Data Mining Classification Algorithm and Predictive Analysis

Syeda Farha Shazmeen Syeda Farha Shazmeen
2013 IOSR Journal of Computer Engineering  
Based on the combination of the four features, Fisher developed a linear discriminant model to distinguish the species from each other classification method to identify the class of Iris flower as Irissetosa  ...  Data Sets used in the application: IRIS Datasets: -we make use of a large database "Fisher"s Iris Dataset" containing 5 attributes and 150 instances.  ...  We thank our parents for their support and thank all our friends and well-wishers who were a constant source of inspiration This is a relatively new field and there is a tremendous potential for future  ... 
doi:10.9790/0661-1060106 fatcat:ffw6zxhlajaljmhstlrz6tbqhe

Shoulder Surfing: From An Experimental Study to a Comparative Framework

Leon Bošnjak, Boštjan Brumen
2019 International Journal of Human-Computer Studies  
The results have important implications for future shoulder surfing studies and the field of Password Security as a whole.  ...  Despite a multitude of proposed solutions over the years, few have employed empirical evaluations and comparisons between different methods, and our understanding of the shoulder surfing phenomenon remains  ...  them (particularly between the different types of graphical passwords, such as recognition-based, pure and cued recall- based, and hybrid schemes).  ... 
doi:10.1016/j.ijhcs.2019.04.003 fatcat:niegkllyifdzxakyu4bjw6or2i

Isn't that Fantabulous

Andrew M. White, Katherine Shaw, Fabian Monrose, Elliott Moreton
2014 Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14  
Over the past few decades, passwords as a means of user authentication have been consistently criticized by users and security analysts alike.  ...  Unfortunately, much of the formal research on user authentication has focused on attempting to provide alternatives (e.g., biometrics) to password-based mechanisms (or belated analyses of users' password  ...  Allowing users a significant period of time in which to become accustomed to the new system highlights the issue of 'password interference' [16] , where the necessity of maintaining multiple passwords  ... 
doi:10.1145/2683467.2683470 dblp:conf/nspw/0002SMM14 fatcat:jtzenrnkg5fptf4hym3vgsmtuq

Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices [article]

Dimitrios Damopoulos, Georgios Portokalidis
2018 arXiv   pre-print
A new glass wearable device was recently introduced by Google and it was immediately welcomed by groups of users, such as the ones described above, as Google Glass allows them to perform actions, like  ...  Users with limited use of their hands, such as people suffering from disabilities of the arm, shoulder, and hand (DASH), face challenges when authenticating with computer terminals, specially with publicly  ...  , requires evaluation and feedback from real users through a pilot study.  ... 
arXiv:1810.02496v1 fatcat:gy7xmwvf2rf7li6i4ytdxyi46m

Towards A Secure E-Health System for Public Healthcare Sector in Egypt Using HL7 . (Dept. A)

Mona Mursi, May Salama, Soha Emad
2021 MEJ Mansoura Engineering Journal  
Hospitals' information containing a set of Egyptian hospitals IDs, addresses and contact information. It also contains the mapping information between physicians and hospitals they work at.  ...  Hospitals' list: containing a set of Egyptian hospitals IDs, addresses and contact information. b. Hospital-physician information: mapping between physicians and hospitals they work at. 3.  ... 
doi:10.21608/bfemu.2021.176376 fatcat:ednc56hddbfzpabhile2am3irq

Learning and performance with gesture guides

Fraser Anderson, Walter F. Bischof
2013 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '13  
They promise natural and efficient interaction, but suffer from a lack of affordances and thus require learning on the part of the user.  ...  Next, we present two studies that help us better understand the role of visual feedback, finding that it has a dramatic effect on the degree to which gestures are learned.  ...  This approach was tested in pilot studies, but did not have the desired effect.  ... 
doi:10.1145/2470654.2466143 dblp:conf/chi/AndersonB13 fatcat:u53t4gkdxjhyjgppll5v6ykwva

Towards the Wireless Ward: Evaluating a Trial of Networked PDAs in the National Health Service [chapter]

Phil Turner, Garry Milne, Susan Turner, Manfred Kubitscheck, Ian Penman
2004 Lecture Notes in Computer Science  
In this paper, we describe a pilot study of the clinical use of a wireless network of personal digital assistants (PDAs).  ...  We describe how we are dealing with the concerns of the clinicians with respect to maintaining the security of patient records and the potential interference which wireless devices might cause critical  ...  In the UK, a pilot study in Glasgow of pen-based PDAs for the capture of anaesthetic clinical data suggested that the device presents a viable alternative to paper [4] , while a feasibility study investigating  ... 
doi:10.1007/978-3-540-24641-1_15 fatcat:s4j6q5t6dzcbjel52zeqliar3y

National Conference on Recent Advances in Communication Engineering and Information Technology

2020 International journal for innovative engineering and management research  
We provide a broad-based engineering curriculum, with opportunities for specialization and self-directed learning and development.  ...  Our first mission is to educate Electronics and Communication engineers for Indian and Global industries.  ...  of Aggregate Interference in 40 TVWS Cognitive Radio Networks 41 Extreme Eigenvalue Based Detection Under Impact of Noise and 41 Interference Uncertainty 42 Machine Learning Based Subsurface Analysis  ... 
doi:10.48047/ijiemr/v08/spe/02 fatcat:woay334irjgebf5bixuc4ng6em

Testing the efficacy of a couple-focused, tailored eHealth intervention for symptom self-management among men with prostate cancer and their partners: the study protocol

Lixin Song, Matthew E. Nielsen, Ronald C. Chen, Christine Rini, Thomas C. Keyserling, Eno Idiagbonya, Gail P. Fuller, Laurel Northouse, Mary H. Palmer, Xianming Tan
2022 Trials  
Methods We will test the efficacy of PERC using a population-based, geographically and demographically diverse cohort in a randomized controlled trial.  ...  Discussion This study will provide a novel model for self-managing chronic illness symptoms that impact couples' relationships, intimacy, and quality of life.  ...  We would like to thank the prostate cancer patients, their families, healthcare professionals, and our research staff for their contributions in the pilot studies and our ongoing trial to make the study  ... 
doi:10.1186/s13063-021-05948-5 pmid:34983621 pmcid:PMC8725423 fatcat:g5ehhloqkbdn3gmeez2mlbcbxu
« Previous Showing results 1 — 15 out of 2,388 results