[go: up one dir, main page]

Tangmanee, 2018 - Google Patents

User test on text-based CAPTCHA: a letter case examination

Tangmanee, 2018

Document ID
11244704659823189808
Author
Tangmanee C
Publication year
Publication venue
Journal of Applied Security Research

External Links

Snippet

ABSTRACT Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA) is a security application requiring a user to input a string of text to verify that the user is human. Each text string has distinctive visual features, making it perceivably different …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Similar Documents

Publication Publication Date Title
Das et al. Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key
US9699176B2 (en) CAPTCHA challenge incorporating obfuscated characters
Fernández-Alemán et al. Analysis of health professional security behaviors in a real clinical setting: an empirical study
US9665701B2 (en) Mask based challenge response test
Ahamed et al. Empowering students for cybersecurity awareness management in the emerging digital era: the role of cybersecurity attitude in the 4.0 industrial revolution era
Weaver et al. Training users to identify phishing emails
Reuter et al. A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead
WO2015157392A1 (en) Method for verifying authorized signer for mobile device based document escrow service
Renaud et al. Now what was that password again? A more flexible way of identifying and authenticating our seniors
US20140157382A1 (en) Observable authentication methods and apparatus
US8898740B2 (en) Mask based challenge response test
EP3114601B1 (en) Access control for a resource
Heather Turnitoff: Identifying and fixing a hole in current plagiarism detection software
Paudel et al. " It doesn't just feel like something a lawyer slapped together." Mental-Model-Based Privacy Policy for Third-Party Applications on Facebook
Al-Ameen et al. On improving the memorability of system-assigned recognition-based passwords
Chatrangsan et al. Robustness and user test on text-based captcha: Letter segmenting is not too easy or too hard
Tangmanee User test on text-based CAPTCHA: a letter case examination
Noorjahan A bio metric based approach for using captcha–to enhance accessibility for the visually impaired
Ciampa A comparison of user preferences for browser password managers
JP7227444B2 (en) Access authentication method using random dot pattern CAPTCHA
Carstens et al. Applying chunking theory in organizational password guidelines.
Ciftci et al. Supporting students’ knowledge and skills in information technology security through a security portal
Abbott et al. Password differences based on language and testing of memory recall
CN106446660A (en) Method, system and terminal device for providing verification code
Tangmanee Effects of text rotation, string length, and letter format on text-based CAPTCHA robustness