Skip to main content

IPAS: User Test Phase and Evaluation

  • Conference paper
  • First Online:
  • 2129 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 301))

Abstract

User authentication is one of the most important topics in information security. A text-based strong password scheme can provide a certain degree of security. However, as strong passwords are difficult to memorize, users often write them down on a piece of paper or even save them in a computer file. An image-based authentication scheme has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. Recently, many networks, computer systems and electronic-commerce environments have tried using a graphical technique for user authentication. All graphical and image algorithms comprise two different aspects: usability and security. Unfortunately, none of the graphical algorithms are able to cover both these aspects at the same time. In this paper, we evaluate the usability and security of different authentication schemes and compare them with our proposed scheme, which is the Implicit Password Authentication System (IPAS) by an experiment and a questionnaire survey.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Almuairfi S, Veeraraghavan P, Chilamkurti N (2011) IPAS: implicit password authentication system. In: Advanced information networking and applications (WAINA), 2011 IEEE workshops of international conference on advanced information networking and applications

    Google Scholar 

  2. Almuairfi S, Veeraraghavan P, Chilamkurti N (2013) A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Math Comput Model 58(1–2):108–116. ISSN 0895-7177, 10.1016/j.mcm.2012.07.005

  3. Xiaoyuan S, Ying Z et al (2005) Graphical passwords: a survey. In: 21st annual computer security applications conference, pp 463–472

    Google Scholar 

  4. Wells J, Hutchinson D, Pierce J (2008) Enhanced security for preventing man-in-the-middle attacks in authentication, data entry and transaction verification. In: Australian information security management conference. Paper 58

    Google Scholar 

  5. Xiaoyuan S, Ying Z et al (2005) Graphical passwords: a survey. In: Computer security applications conference, 21st annual

    Google Scholar 

  6. Pierce JD, Wells JG, Warren MJ, Mackay DR (2003) A conceptual model for graphical authentication. In: 1st Australian information security management conference, 24 Sept. Perth, Western Australia, paper 16

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sadiq Almuairfi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Almuairfi, S., Veeraraghavan, P., Chilamkurti, N. (2014). IPAS: User Test Phase and Evaluation. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-8798-7_2

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-8797-0

  • Online ISBN: 978-94-017-8798-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics