Poet, R. and Chowdhury, S. (2011) Comparing the usability of different levels of user involvement in producing password images. In: International Conference on Information Theory and Information Security, Hangzhou, China, 4-6 Nov 2011,
Full text not currently available from Enlighten.
Abstract
Recognition-based graphical authentication systems rely on the recognition of authenticator images by legitimate users for authentication. This paper presents the results of a study that compared doodle images and Mikon images as authenticators in recognition based graphical authentication systems taking various usability dimensions into account. The results of the usability evaluation, with 20 participants, demonstrated that users preferred Mikon to doodle images as authenticators in recognition based graphical authentication mechanisms. Furthermore, participants found it difficult to recognize doodle images during authentication as well as associate them with something meaningful. Our findings also show the need to consider the security offered by the images, especially their predictability.
Item Type: | Conference Proceedings |
---|---|
Status: | Published |
Refereed: | Yes |
Glasgow Author(s) Enlighten ID: | Poet, Dr Ron |
Authors: | Poet, R., and Chowdhury, S. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
College/School: | College of Science and Engineering > School of Computing Science |
University Staff: Request a correction | Enlighten Editors: Update this record