Xiyang Liu
Draw a line on your PDA to authenticate
Liu, Xiyang; Ren, Zhongjie; Chang, Xiuling; Gao, Haichang; Aickelin, Uwe
Authors
Zhongjie Ren
Xiuling Chang
Haichang Gao
Uwe Aickelin
Abstract
The trend toward a highly mobile workforce and the ubiquity of graphical interfaces (such as the stylus and touch-screen) has enabled the emergence of graphical authentications in Personal Digital Assistants (PDAs) [1]. However, most of the current graphical password schemes are vulnerable to shoulder-surfing [2,3], a known risk where an attacker can capture a password by direct observation or by recording the authentication session. Several approaches have been developed to deal with this problem, but they have significant usability drawbacks, usually in the time and effort to log in, making them less suitable for authentication [4, 8]. For example, it is time-consuming for users to log in CHC [4] and there are complex text memory requirements in scheme proposed by Hong [5]. With respect to the scheme proposed by Weinshall [6], not only is it intricate to log in, but also the main claim of resisting shoulder-surfing is proven false [7]. In this paper, we introduce a new graphical password scheme which provides a good resistance to shoulder surfing and preserves a desirable usability.
Citation
Liu, X., Ren, Z., Chang, X., Gao, H., & Aickelin, U. Draw a line on your PDA to authenticate.
Conference Name | Symposium on Usable Privacy and Security, SOUPS2010 |
---|---|
End Date | Jul 16, 2010 |
Deposit Date | Aug 17, 2011 |
Peer Reviewed | Peer Reviewed |
Public URL | https://nottingham-repository.worktribe.com/output/1012836 |
Files
gao2010d.pdf
(<nobr>209 Kb</nobr>)
PDF
You might also like
Modelling Reactive and Proactive Behaviour in Simulation: A Case Study in a University Organisation
(2011)
Conference Proceeding
Mimicking the behaviour of idiotypic AIS robot controllers using probabilistic systems
(2009)
Presentation / Conference
Articulation and Clarification of the Dendritic Cell Algorithm
(2006)
Book Chapter
The danger theory and its application to Artificial Immune Systems
(2002)
Conference Proceeding
Genetic algorithms for multiple-choice problems
(1999)
Thesis