• Conference Object  

      Influences of users' cognitive strategies on graphical password composition 

      Katsini, Christina P.; Fidas, Christos A.; Belk, Marios; Avouris, Nikolaos M.; Samaras, George S. (Association for Computing Machinery, 2017)
      Recent research reveals interaction effects among human cognitive processing factors, interaction device types and user authentication schemes towards security of user created graphical keys. Aiming to investigate how ...
    • Article  

      The interplay between humans, technology and user authentication: A cognitive processing perspective 

      Belk, Marios; Fidas, Christos A.; Germanakos, Panagiotis; Samaras, George S. (2017)
      This paper investigates the interplay among human cognitive processing differences (field dependence vs. field independence), alternative interaction device types (desktop vs. touch) and user authentication schemes (textual ...
    • Conference Object  

      A novel 3-d model for node and system trust 

      Hadjichristofi, G. C.; Kappos, G.; Hadjicostis, Christoforos N. (2011)
      Nowadays, there is an increasing demand for wireless and mobile networks that guarantee secure and reliable data communication among users. To enable data exchanges, authentication mechanisms need to be in place to dynamically ...
    • Conference Object  

      Palm geometry biometrics: A score-based fusion approach 

      Tsapatsoulis, Nicolas; Pattichis, Constantinos S. (2009)
      In this paper we present an identification and authentication system based on hand geometry. First, we examine the performance of three different methods that are based on hand silhouette and on binarized hand images and ...
    • Article  

      A personalization method based on human factors for improving usability of user authentication tasks 

      Belk, Marios; Germanakos, Panagiotis; Fidas, Christos A.; Samaras, George S. (2014)
      Aiming to ensure safety of operation to application providers and improve the usability of human computer interactions during authentication, this paper proposes a two-step personalization approach of user authentication ...
    • Conference Object  

      Security and usability in knowledge-based user authentication: A review 

      Katsini, Christina P.; Belk, Marios; Fidas, Christos A.; Avouris, Nikolaos M.; Samaras, George S. (Association for Computing Machinery, 2016)
      This paper presents a comprehensive review of state-of-the-art research works in knowledge-based user authentication, covering the security and usability aspects of the most prominent user authentication schemes
    • Article  

      Security for diversity: Studying the effects of verbal and imagery processes on user authentication mechanisms 

      Belk, Marios; Fidas, Christos A.; Germanakos, Panagiotis; Samaras, George S. (2013)
      Stimulated by a large number of different theories on human cognition, suggesting that individuals have different habitual approaches in retrieving, recalling, processing and storing verbal and graphical information, this ...
    • Article  

      Studying the effect of human cognition on user authentication tasks 

      Belk, Marios; Germanakos, Panagiotis; Fidas, Christos A.; Samaras, George S. (2013)
      This paper studies the effect of individual differences in human cognition on user performance in authentication tasks. In particular, a text-based password and a recognition-based graphical authentication mechanism were ...