Figure 20 - uploaded by Anastasios A. Economides
Content may be subject to copyright.
User friendliness of the three methods

User friendliness of the three methods

Source publication
Article
Full-text available
Proof by knowledge authentication techniques" include traditional text passwords, visual passwords and graphical passwords. The paper compares these three techniques using an experiment. A total of 100 users participated in the experiment. After getting informed about the new authentication methods, users created their own text, visual and graphica...

Similar publications

Preprint
Full-text available
Graphical passwords are implemented as an alternative scheme to replace alphanumeric passwords to help users to memorize their password. However, most of the graphical password systems are vulnerable to shoulder-surfing attack due to the usage of the visual interface. In this research, a method that uses shifting condition with digraph substitution...

Citations

Article
Confidentiality and Authentication were once treated different but now-a-days, improvement in technology is demanding both of them to be used together. Though technology is increasing tremendously, smart hackers on the environment always challenges the authentication factors, thereby enforcing more number of factors for authentication to be included. As factors increase, failure rate for authentication may also be more when any one of the factors doesn’t work. A qualitative survey of user authentication systems being used in today’s environment is presented here and a comparative study of various authentication mechanisms used in the world of Information security by various researchers is shown.