M. Dupuis, J. Shorb, James Walker, Fred B. Holt, Michael McIntosh
{"title":"你看到我看到的了吗?:使用视觉密码进行身份验证","authors":"M. Dupuis, J. Shorb, James Walker, Fred B. Holt, Michael McIntosh","doi":"10.1145/3368308.3415458","DOIUrl":null,"url":null,"abstract":"A password is one of the oldest forms of authentication whose popularity has not waned. Passwords are easy to use, inexpensive to deploy, and are familiar by everyone. However, this comes with a cost. Passwords are easy to guess, difficult to remember when they are made complex and unique, and found everywhere on the Dark Web. The security usability paradox suggests that any improvements in security will result in a decrease in usability, and vice versa. In this paper, we examine the feasibility of a visual password system in which a traditional password is used, but with the additional capability of modifying the characters of the password to provide significantly higher levels of entropy.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Do You See What I See?: The Use of Visual Passwords for Authentication\",\"authors\":\"M. Dupuis, J. Shorb, James Walker, Fred B. Holt, Michael McIntosh\",\"doi\":\"10.1145/3368308.3415458\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A password is one of the oldest forms of authentication whose popularity has not waned. Passwords are easy to use, inexpensive to deploy, and are familiar by everyone. However, this comes with a cost. Passwords are easy to guess, difficult to remember when they are made complex and unique, and found everywhere on the Dark Web. The security usability paradox suggests that any improvements in security will result in a decrease in usability, and vice versa. In this paper, we examine the feasibility of a visual password system in which a traditional password is used, but with the additional capability of modifying the characters of the password to provide significantly higher levels of entropy.\",\"PeriodicalId\":374890,\"journal\":{\"name\":\"Proceedings of the 21st Annual Conference on Information Technology Education\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 21st Annual Conference on Information Technology Education\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3368308.3415458\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 21st Annual Conference on Information Technology Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3368308.3415458","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Do You See What I See?: The Use of Visual Passwords for Authentication
A password is one of the oldest forms of authentication whose popularity has not waned. Passwords are easy to use, inexpensive to deploy, and are familiar by everyone. However, this comes with a cost. Passwords are easy to guess, difficult to remember when they are made complex and unique, and found everywhere on the Dark Web. The security usability paradox suggests that any improvements in security will result in a decrease in usability, and vice versa. In this paper, we examine the feasibility of a visual password system in which a traditional password is used, but with the additional capability of modifying the characters of the password to provide significantly higher levels of entropy.