dc.contributor.author | Belk, Marios | en |
dc.contributor.author | Fidas, Christos A. | en |
dc.contributor.author | Germanakos, Panagiotis | en |
dc.contributor.author | Samaras, George S. | en |
dc.creator | Belk, Marios | en |
dc.creator | Fidas, Christos A. | en |
dc.creator | Germanakos, Panagiotis | en |
dc.creator | Samaras, George S. | en |
dc.date.accessioned | 2019-11-13T10:38:26Z | |
dc.date.available | 2019-11-13T10:38:26Z | |
dc.date.issued | 2013 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://gnosis.library.ucy.ac.cy/handle/7/53620 | |
dc.description.abstract | Stimulated by a large number of different theories on human cognition, suggesting that individuals have different habitual approaches in retrieving, recalling, processing and storing verbal and graphical information, this paper investigates the effect of such processes with regard to user performance and preference toward two variations of knowledge-based authentication mechanisms. In particular, a text-based password authentication mechanism and a recognition-based graphical authentication mechanism were deployed in the frame of an ecological valid user study, to investigate the effect of specific cognitive factors of users toward efficiency, effectiveness and preference of authentication tasks. A total of 145 users participated during a five-month period between February and June 2012. This recent study provides interesting insights for the design and deployment of adaptive authentication mechanisms based on cognitive factors of users. The results and implications of this paper are valuable in understanding and modeling user interactions with regard to authentication mechanisms. © 2013 Springer-Verlag. | en |
dc.source | 14th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2013 | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883300011&doi=10.1007%2f978-3-642-40477-1_27&partnerID=40&md5=550e75c23af5dfbd9ffdb59aaede7a37 | |
dc.subject | Efficiency | en |
dc.subject | Knowledge based systems | en |
dc.subject | Effectiveness | en |
dc.subject | Diversity | en |
dc.subject | Network security | en |
dc.subject | Authentication | en |
dc.subject | Human computer interaction | en |
dc.subject | Character recognition | en |
dc.subject | Usable Security | en |
dc.subject | Cognitive Factors | en |
dc.subject | Preference | en |
dc.subject | User Authentication | en |
dc.subject | User Study | en |
dc.title | Security for diversity: Studying the effects of verbal and imagery processes on user authentication mechanisms | en |
dc.type | info:eu-repo/semantics/article | |
dc.identifier.doi | 10.1007/978-3-642-40477-1_27 | |
dc.description.volume | 8119 LNCS | en |
dc.description.issue | PART 3 | en |
dc.description.startingpage | 442 | |
dc.description.endingpage | 459 | |
dc.author.faculty | 002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences | |
dc.author.department | Τμήμα Πληροφορικής / Department of Computer Science | |
dc.type.uhtype | Article | en |
dc.description.notes | <p>Conference code: 99080 | en |
dc.description.notes | Cited By :5</p> | en |
dc.source.abbreviation | Lect. Notes Comput. Sci. | en |
dc.contributor.orcid | Belk, Marios [0000-0001-6200-0178] | |
dc.gnosis.orcid | 0000-0001-6200-0178 | |