dc.contributor.author | Katsini, Christina P. | en |
dc.contributor.author | Fidas, Christos A. | en |
dc.contributor.author | Belk, Marios | en |
dc.contributor.author | Avouris, Nikolaos M. | en |
dc.contributor.author | Samaras, George S. | en |
dc.creator | Katsini, Christina P. | en |
dc.creator | Fidas, Christos A. | en |
dc.creator | Belk, Marios | en |
dc.creator | Avouris, Nikolaos M. | en |
dc.creator | Samaras, George S. | en |
dc.date.accessioned | 2019-11-13T10:40:40Z | |
dc.date.available | 2019-11-13T10:40:40Z | |
dc.date.issued | 2017 | |
dc.identifier.isbn | 978-1-4503-4656-6 | |
dc.identifier.uri | http://gnosis.library.ucy.ac.cy/handle/7/54234 | |
dc.description.abstract | Recent research reveals interaction effects among human cognitive processing factors, interaction device types and user authentication schemes towards security of user created graphical keys. Aiming to investigate how different visual behaviors of individuals with varying cognitive strategies affect the security aspects of graphical user authentication (GUA) across device types, this paper reports preliminary results of a user study (N=51) on graphical password composition using a recognition-based GUA scheme. Results reveal differences on key strength and complexity, as well as on gaze-based entropies between users with different cognitive strategies, which can be used for the design of user-adaptive GUA schemes. Copyright © 2017 by the Association for Computing Machinery, Inc. (ACM). | en |
dc.publisher | Association for Computing Machinery | en |
dc.source | Conference on Human Factors in Computing Systems - Proceedings | en |
dc.source | 2017 ACM SIGCHI Conference on Human Factors in Computing Systems, CHI EA 2017 | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019556739&doi=10.1145%2f3027063.3053217&partnerID=40&md5=844e04ba9fa97d6069ed1e5cd8334929 | |
dc.subject | Authentication | en |
dc.subject | Human engineering | en |
dc.subject | Human cognitive differences | en |
dc.subject | User authentication | en |
dc.subject | Cognitive processing | en |
dc.subject | Usable security | en |
dc.subject | User authentication scheme | en |
dc.subject | Cognitive Strategy | en |
dc.subject | Eye tracking | en |
dc.subject | Eye-tracking | en |
dc.subject | Graphical user authentication | en |
dc.subject | Interaction devices | en |
dc.title | Influences of users' cognitive strategies on graphical password composition | en |
dc.type | info:eu-repo/semantics/conferenceObject | |
dc.identifier.doi | 10.1145/3027063.3053217 | |
dc.description.volume | Part F127655 | en |
dc.description.startingpage | 2698 | |
dc.description.endingpage | 2705 | |
dc.author.faculty | 002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences | |
dc.author.department | Τμήμα Πληροφορικής / Department of Computer Science | |
dc.type.uhtype | Conference Object | en |
dc.description.notes | <p>Conference code: 127655 | en |
dc.description.notes | Cited By :3</p> | en |
dc.contributor.orcid | Belk, Marios [0000-0001-6200-0178] | |
dc.gnosis.orcid | 0000-0001-6200-0178 | |