Open Access. Powered by Scholars. Published by Universities.®

Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

Psychology Theses & Dissertations

Human Factors Psychology

Authentication

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Psychology

Authentication Schemes' Impact On Working Memory, Janine D. Mator Apr 2021

Authentication Schemes' Impact On Working Memory, Janine D. Mator

Psychology Theses & Dissertations

Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …


Identifying The Strengths And Weaknesses Of Over-The-Shoulder Attack Resistant Prototypical Graphical Authentication Schemes, Ashley Allison Cain Apr 2019

Identifying The Strengths And Weaknesses Of Over-The-Shoulder Attack Resistant Prototypical Graphical Authentication Schemes, Ashley Allison Cain

Psychology Theses & Dissertations

Authentication verifies users’ identities to protect against costly attacks. Graphical authentication schemes utilize pictures as passcodes rather than strings of characters. Pictures have been found to be more memorable than the strings of characters used in alphanumeric passwords. However, graphical passcodes have been criticized for being susceptible to Over-the-Shoulder Attacks (OSA). To overcome this concern, many graphical schemes have been designed to be resistant to OSA. Security to this type of attack is accomplished by grouping targets among distractors, translating the selection of targets elsewhere, disguising targets, and using gaze-based input.

Prototypical examples of graphical schemes that use these strategies …