GUIDES: a graphical user identifier scheme using sketching for mobile web-services
Abstract
References
Index Terms
- GUIDES: a graphical user identifier scheme using sketching for mobile web-services
Recommendations
Graphical Password: Prototype Usability Survey
ICACTE '08: Proceedings of the 2008 International Conference on Advanced Computer Theory and EngineeringAccess to computer networks and systems is most often based on the use of conventional passwords nowadays. However, users have difficulty remembering a password that is long and random-appearing. So, they create short, simple, and insecure passwords. ...
A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things
Authentication receives enormous consideration from the research community and is proven to be an interesting field in today’s era. User authentication is the major concern because people have their private data on devices. To strengthen user ...
PassPoints: design and longitudinal evaluation of a graphical password system
Special isssue: HCI research in privacy and security is critical nowComputer security depends largely on passwords to authenticate human users. However, users have difficulty remembering passwords over time if they choose a secure password, i.e. a password that is long and random. Therefore, they tend to choose short ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/522ba276-3e1c-4c79-a916-fe035db4c635/2628363.cover.jpg)
- Conference Chairs:
- Aaron Quigley,
- Sara Diamond,
- Program Chairs:
- Pourang Irani,
- Sriram Subramanian
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 124Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in