The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online applications and computer applications software are increasingly grown and one of the most cornerstone issues of these applications is the usability issue. Investigating the usability of using any technique is very important before distributing that technique. In this paper, we investigate an authentication systems based on recognition graphical password using Doodles Scan System (DSS) were...
CAPTCHA, especially Text-based CAPTCHA, is the most widely used for security over the online environment in the present. That was used for identification automatic program computer and real human users. This technology was introduced by IBM that is a very high-end company in a very high-end country when comparing with countries in this study. This research was performed using a questionnaire to samples...
In traditional online examination environments, physical interaction is often replaced with authentication mechanisms. The absence of face-to-face interaction increases the number of authentication challenges. The authors developed and implemented a Profile Based Authentication Framework (PBAF) with the aim to integrate learning and examination processes for secure online examinations. The PBAF approach...
Smartcard based authentication on web services stays a niche application because of the lack of smartcard readers on the vast majority of internet devices. In this paper we discuss a method that uses an NFC-enabled Smartphone in order to login via NFC-enabled smartcard on basically any internet device. We explain the details of this method and analyze its security, deployability, and usability aspects.
This paper presents the results of a security and usability review of the authentication implementations used by more than 10 UK banks. Our focus is on their use of dual text credentials that combine two passwords, PINs, or challenge questions (and some “partial selection” variations). We model the authentication protocols based upon several deployment choices, such as the credential rules, and use...
Effective user authentication is critical for protecting information and system safety. The most common computer authentication method is text password. Previous research suggests that text password can be hard to remember and users tend to create simple text password that is unsecure. Various password strategies and alternative authentication applications have been proposed, such as mnemonic password,...
Transactions through online applications using a user id and password have greater flexibility in business environment. This key/password life span in such applications is very short which means that they are easily breakable considering attacks like phishing, key logger and shoulder-surfing. Our proposed scheme enhances the key life in such systems by using virtual password mechanism by keeping the...
The current practice of password based security for distributed systems in general and the Internet in particular is inadequate. Besides, remembering a plethora of long passwords and pass phrases sometimes as many as 15 or 20 is cumbersome. This raises the need to introduce a better and more reliable authentication mechanism which is not dependent on a series of characters, but rather on a technology...
We propose a library of web specification patterns to assist web developers and testers in formally specifying web related properties. The current version of the library contains 119 functional and non-functional patterns obtained from scrutinizing various resources in the field of quality assurance of Web Applications, which characterize successful web application using a set of standardized attributes...
In a virtual cluster based Cloud Computing environment, the sharing of infrastructure introduces two problems on user management: usability and security. Meanwhile, we observe that most conventional user management frameworks in the network environment are not fit for the scale expansion and interconnection of dynamic virtualization environment. In this paper, we propose VegaWarden, a uniform user...
We present a novel lightweight password-based solution that safeguards users from Phishing and Pharming attacks. The proposed authentication relies on a hashed password, which is the hash value of the user-typed password and the authentication server's IP address. The solution rests on the fact that the server connected by a client using TCP connection cannot lie about its IP address. If a user is...
In recent years, Identity Management (IdM) has gained a lot of attention in industry, standardisation and academia. In particular, a couple of research projects, like Daidalos or Prime, have invested considerable effort to bring IdM forward, to take advantage of features like improved usability and security. Nevertheless, there are important issues that have not been addressed so far. The SWIFT project...
Nowadays, user authentication is one of the important topics in information security. Strong text-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical authentication has been proposed as a possible alternative solution...
Click based graphical passwords that use background images suffer from hot-spot problem. Previous graphical password schemes based on recognition of images do not have a sufficiently large password space suited for most Internet applications. In this paper, we propose two novel graphical password methods based on recognition of icons to solve the hotspot problem without decreasing the password space...
In this paper we analyze how users behave on the Internet while dealing with software download. We present the results of a usability test performed comparing the Internet Explorer SP-1 software download interface with a wizard-based interface. Experimental results show that our 3-step wizard is effective in increasing users' attention level and is almost error free.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.