Show simple item record

dc.contributor.authorAlsaiari, H
dc.contributor.authorPapadaki, M
dc.contributor.authorHaskell-Dowland, P
dc.contributor.authorFurnell, SM
dc.date.accessioned2016-06-30T19:03:46Z
dc.date.issued2016-05-18
dc.identifier.issn1939-3555
dc.identifier.issn1939-3547
dc.identifier.other1-3
dc.identifier.urihttp://hdl.handle.net/10026.1/5003
dc.descriptionJournal has two ISSNs: 1939-3555 (Print), 1939-3547 (Online)
dc.description.abstract

Complying with a security policy often requires users to create long and complex passwords to protect their accounts. However, remembering such passwords is difficult for many and may lead to insecure practices, such as choosing weak passwords or writing them down. In addition, they are vulnerable to various types of attacks, such as shoulder surfing, replay, and keylogger attacks (Gupta, Sahni, Sabbu, Varma, & Gangashetty, 2012) One-Time Passwords (OTPs) aim to overcome such problems (Gupta et al., 2012); however, most implemented OTP techniques require special hardware, which not only adds cost, but there are also issues regarding its availability (Brostoff, Inglesant, & Sasse, 2010). In contrast, the use of graphical passwords is an alternative authentication mechanism designed to aid memorability and ease of use, often forming part of a multifactor authentication process. This article is complementary to the earlier work that introduced and evaluated the security of the new hybrid user-authentication approach: Graphical One-Time Password (GOTPass) (Alsaiari et al., 2015). The scheme aims to combine the usability of recognition-based and draw-based graphical passwords with the security of OTP. The article presents the results of an empirical user study that investigates the usability features of the proposed approach, as well as pretest and posttest questionnaires. The experiment was conducted during three separate sessions, which took place over five weeks, to measure the efficiency, effectiveness, memorability, and user satisfaction of the new scheme. The results showed that users were able to easily create and enter their credentials as well as remember them over time. Participants carried out a total of 1,302 login attempts with a 93% success rate and an average login time of 24.5s.

dc.format.extent94-108
dc.languageen
dc.language.isoen
dc.publisherTaylor and Francis
dc.subjectAuthentication
dc.subjectgraphical passwords
dc.subjectknowledge-based authentication
dc.subjectOne-Time Password
dc.subjectusable security
dc.titleGraphical One-Time Password (GOTPass): A usability evaluation
dc.typejournal-article
dc.typeArticle
plymouth.issue1-3
plymouth.volume25
plymouth.publisher-urlhttp://www.tandfonline.com/doi/pdf/10.1080/19393555.2016.1179374
plymouth.publication-statusPublished
plymouth.journalInformation Security Journal: A Global Perspective
dc.identifier.doi10.1080/19393555.2016.1179374
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Users by role
dcterms.dateAccepted2016-04-13
dc.rights.embargodate2017-5-18
dc.identifier.eissn1939-3547
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1080/19393555.2016.1179374
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2016-05-18
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV