Renaud et al., 2007 - Google Patents
Now what was that password again? A more flexible way of identifying and authenticating our seniorsRenaud et al., 2007
View PDF- Document ID
- 7963889544004662731
- Author
- Renaud K
- Ramsay J
- Publication year
- Publication venue
- Behaviour & Information Technology
External Links
Snippet
The Web offers facilities which can make a huge difference to the lives of users with reduced mobility, something that affects many older users. Users have to be authorized to access restricted websites. This involves a two-step process: identification and authentication …
- 238000000034 method 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Renaud et al. | Now what was that password again? A more flexible way of identifying and authenticating our seniors | |
Stobert et al. | The password life cycle | |
Jensen et al. | Training to mitigate phishing attacks using mindfulness techniques | |
Wright et al. | Do you see your password? Applying recognition to textual passwords | |
Keith et al. | The usability of passphrases for authentication: An empirical field study | |
Cherapau et al. | On the Impact of Touch {ID} on {iPhone} Passcodes | |
Rogers et al. | Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis | |
Zhang et al. | Improving multiple-password recall: an empirical study | |
Al-Ameen et al. | Towards making random passwords memorable: Leveraging users' cognitive ability through multiple cues | |
Acierno et al. | Relevance of perpetrator identity to reporting elder financial and emotional mistreatment | |
Zhao et al. | Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation | |
Bauer et al. | A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality | |
Helkala | Disabilities and authentication methods: Usability and security | |
Das | A risk-reduction-based incentivization model for human-centered multi-factor authentication | |
Seigfried-Spellar et al. | Differentiating hackers, identity thieves, cyberbullies, and virus writers by college major and individual differences | |
Zhou et al. | A mobile app for assisting users to make informed selections in security settings for protecting personal health data: development and feasibility study | |
Løge | Tell me who you are and i will tell you your unlock pattern | |
Renaud | A visuo-biometric authentication mechanism for older users | |
Trawnih et al. | Determining perceptions of banking customers regarding fingerprint ATMs | |
Notoatmodjo | Exploring the'weakest link': A study of personal password security | |
Fallahi et al. | On the usability of next-generation authentication: A study on eye movement and brainwave-based mechanisms | |
Stojmenović et al. | What is beautiful is secure | |
Wang et al. | Pixi: Password inspiration by exploring information | |
Ciampa et al. | Online versus local password management applications: an analysis of user training and reactions | |
Jenkins | Alleviating insider threats: Mitigation strategies and detection techniques |