Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism

This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwor...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2012-03, Vol.9 (2), p.222-235
Hauptverfasser: Chiasson, S., Stobert, E., Forget, A., Biddle, R., Van Oorschot, P. C.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 235
container_issue 2
container_start_page 222
container_title IEEE transactions on dependable and secure computing
container_volume 9
creator Chiasson, S.
Stobert, E.
Forget, A.
Biddle, R.
Van Oorschot, P. C.
description This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwords of higher security, in the sense of being from an expanded effective security space. We use persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more difficult to guess, click-points.
doi_str_mv 10.1109/TDSC.2011.55
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_6065736</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6065736</ieee_id><sourcerecordid>2636238031</sourcerecordid><originalsourceid>FETCH-LOGICAL-c397t-9725346d00433ee9264d8414ffb4699ff51b19a53522006157363e1fdce5bd083</originalsourceid><addsrcrecordid>eNpd0T1PwzAQBmALgUQpbGwskVgYmuKL7SRmK2mBiiIqUebITS6tSz5KnBTx73FaxMB0d9Lj08kvIZdAhwBU3i7Gb9HQowBDIY5IDyQHl1IIj20vuHCFDOCUnBmzodTjoeQ9Us-xNq0yeodO1GLqRLlOPtx5pcvG3DljNHpVDpxpsc2xwLJRja7srMrUmexU3u5np8oc5TyX1VeO6Qrde2XsplHbrO0LnRzMCyZrVWpTnJOTTOUGL35rn7w_TBbRkzt7fZxGo5mbMBk0rgw8wbifUsoZQ5Sez9OQA8-yJfelzDIBS5BKMOF5lPogAuYzhCxNUCxTGrI-uTns3dbVZ4umiQttEsxzVWLVmhj8ABiVQUAtvf5HN1Vbl_a6GLoPlAIks2pwUEldGVNjFm9rXaj626K4CyDuAoi7AGIhLL86cI2If9Sn_v7SHyizgAU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1001895193</pqid></control><display><type>article</type><title>Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism</title><source>IEEE Electronic Library (IEL)</source><creator>Chiasson, S. ; Stobert, E. ; Forget, A. ; Biddle, R. ; Van Oorschot, P. C.</creator><creatorcontrib>Chiasson, S. ; Stobert, E. ; Forget, A. ; Biddle, R. ; Van Oorschot, P. C.</creatorcontrib><description>This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwords of higher security, in the sense of being from an expanded effective security space. We use persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more difficult to guess, click-points.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2011.55</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Access protocols ; Analysis ; Authentication ; Authentication protocols ; Blogs ; Computation ; Computer graphics ; Computer programming ; Cybersecurity ; Design engineering ; Digital Object Identifier ; empirical studies ; graphical passwords ; Knowledge ; Knowledge base ; Knowledge based systems ; Passwords ; Privacy ; Security ; Studies ; Usability ; usable security</subject><ispartof>IEEE transactions on dependable and secure computing, 2012-03, Vol.9 (2), p.222-235</ispartof><rights>Copyright IEEE Computer Society Jan-Mar 2012</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c397t-9725346d00433ee9264d8414ffb4699ff51b19a53522006157363e1fdce5bd083</citedby><cites>FETCH-LOGICAL-c397t-9725346d00433ee9264d8414ffb4699ff51b19a53522006157363e1fdce5bd083</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6065736$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6065736$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chiasson, S.</creatorcontrib><creatorcontrib>Stobert, E.</creatorcontrib><creatorcontrib>Forget, A.</creatorcontrib><creatorcontrib>Biddle, R.</creatorcontrib><creatorcontrib>Van Oorschot, P. C.</creatorcontrib><title>Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwords of higher security, in the sense of being from an expanded effective security space. We use persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more difficult to guess, click-points.</description><subject>Access protocols</subject><subject>Analysis</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Blogs</subject><subject>Computation</subject><subject>Computer graphics</subject><subject>Computer programming</subject><subject>Cybersecurity</subject><subject>Design engineering</subject><subject>Digital Object Identifier</subject><subject>empirical studies</subject><subject>graphical passwords</subject><subject>Knowledge</subject><subject>Knowledge base</subject><subject>Knowledge based systems</subject><subject>Passwords</subject><subject>Privacy</subject><subject>Security</subject><subject>Studies</subject><subject>Usability</subject><subject>usable security</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpd0T1PwzAQBmALgUQpbGwskVgYmuKL7SRmK2mBiiIqUebITS6tSz5KnBTx73FaxMB0d9Lj08kvIZdAhwBU3i7Gb9HQowBDIY5IDyQHl1IIj20vuHCFDOCUnBmzodTjoeQ9Us-xNq0yeodO1GLqRLlOPtx5pcvG3DljNHpVDpxpsc2xwLJRja7srMrUmexU3u5np8oc5TyX1VeO6Qrde2XsplHbrO0LnRzMCyZrVWpTnJOTTOUGL35rn7w_TBbRkzt7fZxGo5mbMBk0rgw8wbifUsoZQ5Sez9OQA8-yJfelzDIBS5BKMOF5lPogAuYzhCxNUCxTGrI-uTns3dbVZ4umiQttEsxzVWLVmhj8ABiVQUAtvf5HN1Vbl_a6GLoPlAIks2pwUEldGVNjFm9rXaj626K4CyDuAoi7AGIhLL86cI2If9Sn_v7SHyizgAU</recordid><startdate>20120301</startdate><enddate>20120301</enddate><creator>Chiasson, S.</creator><creator>Stobert, E.</creator><creator>Forget, A.</creator><creator>Biddle, R.</creator><creator>Van Oorschot, P. C.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYYUZ</scope><scope>Q9U</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20120301</creationdate><title>Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism</title><author>Chiasson, S. ; Stobert, E. ; Forget, A. ; Biddle, R. ; Van Oorschot, P. C.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c397t-9725346d00433ee9264d8414ffb4699ff51b19a53522006157363e1fdce5bd083</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Access protocols</topic><topic>Analysis</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Blogs</topic><topic>Computation</topic><topic>Computer graphics</topic><topic>Computer programming</topic><topic>Cybersecurity</topic><topic>Design engineering</topic><topic>Digital Object Identifier</topic><topic>empirical studies</topic><topic>graphical passwords</topic><topic>Knowledge</topic><topic>Knowledge base</topic><topic>Knowledge based systems</topic><topic>Passwords</topic><topic>Privacy</topic><topic>Security</topic><topic>Studies</topic><topic>Usability</topic><topic>usable security</topic><toplevel>online_resources</toplevel><creatorcontrib>Chiasson, S.</creatorcontrib><creatorcontrib>Stobert, E.</creatorcontrib><creatorcontrib>Forget, A.</creatorcontrib><creatorcontrib>Biddle, R.</creatorcontrib><creatorcontrib>Van Oorschot, P. C.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chiasson, S.</au><au>Stobert, E.</au><au>Forget, A.</au><au>Biddle, R.</au><au>Van Oorschot, P. C.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2012-03-01</date><risdate>2012</risdate><volume>9</volume><issue>2</issue><spage>222</spage><epage>235</epage><pages>222-235</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwords of higher security, in the sense of being from an expanded effective security space. We use persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more difficult to guess, click-points.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2011.55</doi><tpages>14</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2012-03, Vol.9 (2), p.222-235
issn 1545-5971
1941-0018
language eng
recordid cdi_ieee_primary_6065736
source IEEE Electronic Library (IEL)
subjects Access protocols
Analysis
Authentication
Authentication protocols
Blogs
Computation
Computer graphics
Computer programming
Cybersecurity
Design engineering
Digital Object Identifier
empirical studies
graphical passwords
Knowledge
Knowledge base
Knowledge based systems
Passwords
Privacy
Security
Studies
Usability
usable security
title Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T07%3A24%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Persuasive%20Cued%20Click-Points:%20Design,%20Implementation,%20and%20Evaluation%20of%20a%20Knowledge-Based%20Authentication%20Mechanism&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Chiasson,%20S.&rft.date=2012-03-01&rft.volume=9&rft.issue=2&rft.spage=222&rft.epage=235&rft.pages=222-235&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2011.55&rft_dat=%3Cproquest_RIE%3E2636238031%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1001895193&rft_id=info:pmid/&rft_ieee_id=6065736&rfr_iscdi=true