Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Towards Usable Solutions to Graphical Password Hotspot Problem
Date
2009-07-24
Author
BIÇAKCI, KEMAL
ATALAY, NART BEDİN
Yuceel, Mustafa
Gurbaslar, Hakan
Erdeniz, Burak
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
183
views
0
downloads
Cite This
Click based graphical passwords that use background images suffer from hot-spot problem. Previous graphical password schemes based on recognition of images do not have a sufficiently large password space suited for most Internet applications. In this paper, we propose two novel graphical password methods based on recognition of icons to solve the hotspot problem without decreasing the password space. The experiment we have conducted that compares the security and usability of proposed methods with earlier work (i.e. Passpoints) shows that hotspot problem can be eliminated if a small increase in password entrance and confirmation times is tolerable.
Subject Keywords
Graphical password
,
Authentication
,
Usable security
,
Password security
URI
https://hdl.handle.net/11511/67940
Collections
Department of Mathematics, Conference / Seminar
Suggestions
OpenMETU
Core
Graphical Passwords as Browser Extension: Implementation and Usability Study
BIÇAKCI, KEMAL; Yuceel, Mustafa; Erdeniz, Burak; Gurbaslar, Hakan; ATALAY, NART BEDİN (2009-06-19)
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security researchers for a long time. On one hand, there are password manager programs which facilitate generating site-specific strong passwords from a single user password to eliminate the memory burden due to multiple passwords. On the other hand, there are studies exploring the viability of graphical pas...
The role of visual coherence in graphical passwords
Özge, Alaçam; Christopher, Habel; Acartürk, Cengiz (null; 2013-08-31)
Graphical password is an alternative method of authentication to alphanumerical passwords. From theperspectiveof research on human memory, it is yet another novel technology that introduces challenges on human memory components. In this study, we aim to investigatethe previousfindings in human visual memory in the domain ofgraphical passwords by analyzingthe role ofvisual coherence in passwords. The results of an experimental studyreveal that in terms of memorability, co...
Analysis of Password Attacks From The Perspective Of The Attacker By Multiple Honeypots
Aydın, Kıvanç; Acartürk, Cengiz; Department of Cybersecurity (2021-8-19)
Authentication is vital for secure operation of ICT systems. Since the past several decades, alternative solutions have been developed for authentication, such as biometric authentication methods, aiming at replacing passwords. Nevertheless, their success has been limited as evidenced by intensive use of passwords. Today, an average user uses dozens of different passwords in daily practice. The frequent use of passwords in authentication also leads to a close interest of attackers due to rapid the expansion...
Comparison of classification algorithms for mobile malware detection: market metadata as input source
Baltacı, Nuray; Baykal, Nazife; Acartürk, Cengiz; Department of Information Systems (2014)
The prevalence of mobile devices has been catching the attention of malware authors especially for Android OS supported devices due to its user-centric security policy and open application development strategy for its official application market. In this study, an automated feature-based static analysis method was applied to detect malicious mobile applications on Android devices. The main purpose of the study is to investigate the contribution of other application market metadata to the detection of malici...
Re-finding Behaviour in Educational Search
Usta, Arif; Altıngövde, İsmail Sengör; Ozcan, Rifat; ULUSOY, ÖZGÜR (2019-01-01)
One of the search tasks in Web search is repeat search behaviour to find out documents that users once visited, which is called re-finding. Although there have been several works in the context of general-purpose Web search addressing the latter phenomena, the problem is usually overlooked for vertical search engines. In this work, we report re-finding and newfinding behaviours of users in an educational search context and compare results with the findings in the literature for general-purpose web search. O...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
K. BIÇAKCI, N. B. ATALAY, M. Yuceel, H. Gurbaslar, and B. Erdeniz, “Towards Usable Solutions to Graphical Password Hotspot Problem,” 2009, p. 991, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/67940.