{"title":"在挑战集中选择传球图像时防止肩部冲浪","authors":"S. Jebriel, R. Poet","doi":"10.1109/INNOVATIONS.2011.5893865","DOIUrl":null,"url":null,"abstract":"In this paper we present an experiment to detect the vulnerability of recognition based graphical authentication system to shoulder surfing. The experiment is conducted with teams of two, a user logging in to such as system and an observer who is trying to spot the user's pass-image. Our results suggest that inputting our choice via the keyboard is more secure than using a mouse. We use three different ways of clicking keyboard input and find that they are all approximate equally secure.","PeriodicalId":173102,"journal":{"name":"2011 International Conference on Innovations in Information Technology","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Preventing shoulder-surfing when selecting pass-images in challenge set\",\"authors\":\"S. Jebriel, R. Poet\",\"doi\":\"10.1109/INNOVATIONS.2011.5893865\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we present an experiment to detect the vulnerability of recognition based graphical authentication system to shoulder surfing. The experiment is conducted with teams of two, a user logging in to such as system and an observer who is trying to spot the user's pass-image. Our results suggest that inputting our choice via the keyboard is more secure than using a mouse. We use three different ways of clicking keyboard input and find that they are all approximate equally secure.\",\"PeriodicalId\":173102,\"journal\":{\"name\":\"2011 International Conference on Innovations in Information Technology\",\"volume\":\"2018 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Innovations in Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INNOVATIONS.2011.5893865\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Innovations in Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INNOVATIONS.2011.5893865","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Preventing shoulder-surfing when selecting pass-images in challenge set
In this paper we present an experiment to detect the vulnerability of recognition based graphical authentication system to shoulder surfing. The experiment is conducted with teams of two, a user logging in to such as system and an observer who is trying to spot the user's pass-image. Our results suggest that inputting our choice via the keyboard is more secure than using a mouse. We use three different ways of clicking keyboard input and find that they are all approximate equally secure.