[go: up one dir, main page]

Renaud et al., 2007 - Google Patents

Now what was that password again? A more flexible way of identifying and authenticating our seniors

Renaud et al., 2007

View PDF
Document ID
7963889544004662731
Author
Renaud K
Ramsay J
Publication year
Publication venue
Behaviour & Information Technology

External Links

Snippet

The Web offers facilities which can make a huge difference to the lives of users with reduced mobility, something that affects many older users. Users have to be authorized to access restricted websites. This involves a two-step process: identification and authentication …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Similar Documents

Publication Publication Date Title
Renaud et al. Now what was that password again? A more flexible way of identifying and authenticating our seniors
Stobert et al. The password life cycle
Jensen et al. Training to mitigate phishing attacks using mindfulness techniques
Wright et al. Do you see your password? Applying recognition to textual passwords
Keith et al. The usability of passphrases for authentication: An empirical field study
Cherapau et al. On the Impact of Touch {ID} on {iPhone} Passcodes
Rogers et al. Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis
Zhang et al. Improving multiple-password recall: an empirical study
Al-Ameen et al. Towards making random passwords memorable: Leveraging users' cognitive ability through multiple cues
Acierno et al. Relevance of perpetrator identity to reporting elder financial and emotional mistreatment
Zhao et al. Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation
Bauer et al. A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality
Helkala Disabilities and authentication methods: Usability and security
Das A risk-reduction-based incentivization model for human-centered multi-factor authentication
Seigfried-Spellar et al. Differentiating hackers, identity thieves, cyberbullies, and virus writers by college major and individual differences
Zhou et al. A mobile app for assisting users to make informed selections in security settings for protecting personal health data: development and feasibility study
Løge Tell me who you are and i will tell you your unlock pattern
Renaud A visuo-biometric authentication mechanism for older users
Trawnih et al. Determining perceptions of banking customers regarding fingerprint ATMs
Notoatmodjo Exploring the'weakest link': A study of personal password security
Fallahi et al. On the usability of next-generation authentication: A study on eye movement and brainwave-based mechanisms
Stojmenović et al. What is beautiful is secure
Wang et al. Pixi: Password inspiration by exploring information
Ciampa et al. Online versus local password management applications: an analysis of user training and reactions
Jenkins Alleviating insider threats: Mitigation strategies and detection techniques