Tangmanee, 2018 - Google Patents
User test on text-based CAPTCHA: a letter case examinationTangmanee, 2018
- Document ID
- 11244704659823189808
- Author
- Tangmanee C
- Publication year
- Publication venue
- Journal of Applied Security Research
External Links
Snippet
ABSTRACT Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA) is a security application requiring a user to input a string of text to verify that the user is human. Each text string has distinctive visual features, making it perceivably different …
- 230000004044 response 0 abstract description 52
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Das et al. | Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key | |
US9699176B2 (en) | CAPTCHA challenge incorporating obfuscated characters | |
Fernández-Alemán et al. | Analysis of health professional security behaviors in a real clinical setting: an empirical study | |
US9665701B2 (en) | Mask based challenge response test | |
Ahamed et al. | Empowering students for cybersecurity awareness management in the emerging digital era: the role of cybersecurity attitude in the 4.0 industrial revolution era | |
Weaver et al. | Training users to identify phishing emails | |
Reuter et al. | A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead | |
WO2015157392A1 (en) | Method for verifying authorized signer for mobile device based document escrow service | |
Renaud et al. | Now what was that password again? A more flexible way of identifying and authenticating our seniors | |
US20140157382A1 (en) | Observable authentication methods and apparatus | |
US8898740B2 (en) | Mask based challenge response test | |
EP3114601B1 (en) | Access control for a resource | |
Heather | Turnitoff: Identifying and fixing a hole in current plagiarism detection software | |
Paudel et al. | " It doesn't just feel like something a lawyer slapped together." Mental-Model-Based Privacy Policy for Third-Party Applications on Facebook | |
Al-Ameen et al. | On improving the memorability of system-assigned recognition-based passwords | |
Chatrangsan et al. | Robustness and user test on text-based captcha: Letter segmenting is not too easy or too hard | |
Tangmanee | User test on text-based CAPTCHA: a letter case examination | |
Noorjahan | A bio metric based approach for using captcha–to enhance accessibility for the visually impaired | |
Ciampa | A comparison of user preferences for browser password managers | |
JP7227444B2 (en) | Access authentication method using random dot pattern CAPTCHA | |
Carstens et al. | Applying chunking theory in organizational password guidelines. | |
Ciftci et al. | Supporting students’ knowledge and skills in information technology security through a security portal | |
Abbott et al. | Password differences based on language and testing of memory recall | |
CN106446660A (en) | Method, system and terminal device for providing verification code | |
Tangmanee | Effects of text rotation, string length, and letter format on text-based CAPTCHA robustness |