CFP last date
20 January 2025
Reseach Article

Evaluation of a usable Hybrid Authentication System

by Ayannuga Olanrewaju O., Folorunso Olusegun, Akinwale Adio T.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 17 - Number 8
Year of Publication: 2011
Authors: Ayannuga Olanrewaju O., Folorunso Olusegun, Akinwale Adio T.
10.5120/2240-2863

Ayannuga Olanrewaju O., Folorunso Olusegun, Akinwale Adio T. . Evaluation of a usable Hybrid Authentication System. International Journal of Computer Applications. 17, 8 ( March 2011), 27-31. DOI=10.5120/2240-2863

@article{ 10.5120/2240-2863,
author = { Ayannuga Olanrewaju O., Folorunso Olusegun, Akinwale Adio T. },
title = { Evaluation of a usable Hybrid Authentication System },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 17 },
number = { 8 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume17/number8/2240-2863/ },
doi = { 10.5120/2240-2863 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:05:04.247429+05:30
%A Ayannuga Olanrewaju O.
%A Folorunso Olusegun
%A Akinwale Adio T.
%T Evaluation of a usable Hybrid Authentication System
%J International Journal of Computer Applications
%@ 0975-8887
%V 17
%N 8
%P 27-31
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increase in the use of automated systems has brought about an increase in the amount of personal information in electronic form; and as a result there is need for confidentiality. A good system must be able to identify “who” is accessing “what”. Several authentication systems use password (text) as an authentication means while in modern computing, graphical password is beginning to gain ground due to its advantage in the area of usability. This paper studies graphical password with the view of merging its strength with the strengths of text password to produce what is known as a hybrid authentication system.

References
  1. Wiedenbeck S., Waters J., Birget J, Brodskiy A., and Memon N. (2005). Authentication using graphical passwords: Basic results. In 11th International Conference on Human-Computer Interaction (HCI International).
  2. Richard E. Smith. October 2001. Authentication: From Passwords to Public Keys, chapter 2-3,6, pages 39{101, 155{192. Addison-Wesley Professional.
  3. Jain A, Hong L., and Pankanti S. February 2000. Biometric identification. Communication of the ACM, 43(2):91 -98.
  4. Renaud, K., & Smith, E. (2001). Jiminy: helping users to remember their passwords. In Proc. SAICSIT Annual Conference.
  5. DeAngeli, A., Coventry, L., Johnson, G., & Renaud, K.(2005). Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63(2005), 128-152.
  6. Chiasson S., Forget A., Stobert E., van Oorschot P., and Biddle R. September 2008. Multiple password interference in text and click-based graphical passwords. (Manuscript under submission). Technical Report TR-08-20, School of Computer Science, Carleton University.
  7. Paivio A. 2006. Mind and its evolution: a dual coding theoretical approach. Lawrence Erlbaum: Mahwah, N.J..
  8. Jermyn I., Mayer A., Monrose F., Reiter M., and Rubin A. August 1999. The design and analysis of graphical passwords. In 8th USENIX Security Symposium.
  9. Tao H. and Adams C. 2008. Pass-Go: A proposal to improve the usability of graphical passwords. International Journal of Network Security, 7(2): 273-292.
  10. Stubblefield A. and Simon D. (2004). Inkblot Authentication, MSR-TR-2004-85. Technical report, Microsoft Research, Microsoft Corporation.
  11. Blonder G. (1996). Graphical passwords. United States Patent 5,559,961.
  12. Suo X, Zhu Y, and Owen G. December 2005. Graphical passwords: A survey. 21st Annual Computer Security Applications Conference.
  13. Anderson J. and Bower G. March 1972. Recognition and retrieval processes in free recall. Psychological Review, 79(2):97.
  14. Kintsch W. (1970). Models for free recall and recognition. In D. Norman, editor, Models of human memory, chapter Models for free recall and recognition. Academic Press: New York.
  15. Dhamija, R. and Perrig, A. (2000). Deja Vu: A User Study Using Images for Authentication. In Proceedings of the 9th USENIX Security Symposium. http://www.simson.net/ref/2000/usingImagesForAuthentication.pdf>. 45–48.
  16. Ali Mohamed Eljetlawi and Norafida Bt.Ithnin. (2009). Graphical Password: Usable Graphical Password Prototype. Journal of International Commercial Law and Technology. Vol. 4, Issue 4
  17. Wendy Moncur and Grégory Leplâtre (2007): Pictures at the ATM: Exploring the usability of multiple graphical password.
Index Terms

Computer Science
Information Sciences

Keywords

User Authentication Graphical Password Usable Security