LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Rooney, James (2013)
Languages: English
Types: Doctoral thesis
Subjects: QA75
Mobile devices are providing ever increasing functionality to users, and the risks associated with applications storing personal details are high. Graphical authentication methods have been shown to provide better security in terms of password space than traditional approaches, as well as being more memorable. The usability of any system is important since an unusable system will often be avoided. This thesis aims to investigate graphical authentication methods based on recall, cued recall and recognition memory in terms of their usability and security.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Brown, A.S., Bracken, E., Zoccoli, S. & Douglas, K. (2004). Generating and remembering passwords. Applied Cognitive Psychology. 18 (6): 641-651.
    • Buchanan, G., Farrant, S., Jones, M., Thimbleby, H., Marsden, G. & Pazzani, M. (2001).
    • Improving Mobile Internet Usability. In: Proceedings of the 10th International Conference on the World Wide Web. WWW '01. Hong Kong, New York, NY, USA: ACM. pp. 673- 680.
    • Budgen, D. (2008). ASE-EVAL: Software Evaluation Glossary - Version 1.1. Available from: http://www.dur.ac.uk/ebse/resources/ASE-EVAL-glossary.pdf. [Accessed: 07/07/2010].
    • Buennemeyer, T.K., Nelson, T.M., Clagett, L.M., Dunning, J.P., Marchany, R.C. & Tront, J.G. (2008). Mobile Device Profiling and Intrusion Detection Using Smart Batteries. In: 41st Annual Hawaii International Conference on System Sciences. Waikoloa, Big Island, Hawaii, January 7-10, IEEE Computer Society. pp. 296-296.
    • Burr, W.E., Dodson, D.F. & Polk, W.T. (2006). Electronic Authentication Guideline.
    • Available from: http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf.
    • [Accessed: 08/01/2010].
    • Hager, C.T. & Midkiff, S.F. (2003). An analysis of Bluetooth security vulnerabilities. In: IEEE Wireless Communications and Networking. New Orleans, LA, USA, 20th March 2003, pp. 1825-1831.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article