A Free Drawing Graphical Password Scheme

作者: Alice J. Lin , Fuhua (Frank) Cheng

DOI: 10.3722/CADAPS.2009.553-561

关键词:

摘要: AbstractThis paper presents a method for freely drawing graphical password. The new achieves better security than conventional textual passwords and other password schemes. With this it is also easier user to remember the basic idea of use number user’s representative sample drawings predict future prediction interval. predicted values are obtained by conducting least squares polynomial regression/B-spline regression model. Based on deviation drawings, interval signature/picture generated. This used as and, subsequently, if drawn lies within interval, authenticated into application.

参考文章(13)
Fabian Monrose, Ian Jermyn, Aviel D. Rubin, Michael K. Reiter, Alain Mayer, The design and analysis of graphical passwords usenix security symposium. pp. 1- 1 ,(1999)
Alma Whitten, J. D. Tygar, Why Johnny can't encrypt: a usability evaluation of PGP 5.0 usenix security symposium. pp. 14- 14 ,(1999)
Fabian Monrose, Darren Davis, Michael K. Reiter, On user choice in graphical password schemes usenix security symposium. pp. 11- 11 ,(2004)
Amela Karahasanovic, Gregor E. Kennedy, Richard C. Thomas, An investigation into keystroke latency metrics as an indicator of programming performance australasian computing education conference. pp. 127- 134 ,(2005)
Roger N. Shepard, Recognition memory for words, sentences, and pictures Journal of Verbal Learning and Verbal Behavior. ,vol. 6, pp. 156- 163 ,(1967) , 10.1016/S0022-5371(67)80067-7
Ross J. Anderson, Why cryptosystems fail Communications of The ACM. ,vol. 37, pp. 32- 40 ,(1994) , 10.1145/188280.188291
J. Yan, A. Blackwell, R. Anderson, A. Grant, Password memorability and security: empirical results ieee symposium on security and privacy. ,vol. 2, pp. 25- 31 ,(2004) , 10.1109/MSP.2004.81
Deepayan Chakrabarti, Yang Wang, Chenxi Wang, Jurij Leskovec, Christos Faloutsos, Epidemic thresholds in real networks ACM Transactions on Information and System Security. ,vol. 10, pp. 1- 26 ,(2008) , 10.1145/1284680.1284681
P. C. van Oorschot, Julie Thorpe, On predictive models and user-drawn graphical passwords ACM Transactions on Information and System Security. ,vol. 10, pp. 1- 33 ,(2008) , 10.1145/1284680.1284685