dc.contributor.author |
Vorster, JS
|
|
dc.contributor.author |
Van Heerden, Renier P
|
|
dc.contributor.author |
Irwin, B
|
|
dc.date.accessioned |
2017-07-28T09:11:27Z |
|
dc.date.available |
2017-07-28T09:11:27Z |
|
dc.date.issued |
2016-08 |
|
dc.identifier.citation |
Vorster, J.S., Van Heerden, R.P. and Irwin, B. 2016. The pattern-richness of graphical passwords. 15th International Information Security South Africa Conference, 17-18 August 2016, Rosebank, Johannesburg, South Africa, DOI: 10.1109/ISSA.2016.7802931 |
en_US |
dc.identifier.isbn |
978-1-5090-2473-5 |
|
dc.identifier.uri |
http://ieeexplore.ieee.org/document/7802931/
|
|
dc.identifier.uri |
DOI: 10.1109/ISSA.2016.7802931
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/9389
|
|
dc.description |
Copyright: 2016 IEEE. Due to copyright restrictions, the attached PDF file contains the accepted version of the published version. For access to the published version, kindly consult the publisher's website. |
en_US |
dc.description.abstract |
Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as ”password”, ”admin” or ”12345”. Patterns may similarly be detected in the use of Graphical passwords (GPs). The most significant such pattern – reported by many researchers – is hotspot clustering. This paper qualitatively analyses more than 200 graphical passwords for patterns other than the classically reported hotspots. The qualitative analysis finds that a significant percentage of passwords fall into a small set of patterns; patterns that can be used to form attack models against GPs. In counter action, these patterns can also be used to educate users so that future password selection is more secure. It is the hope that the outcome from this research will lead to improved behaviour and an enhancement in graphical password security. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.relation.ispartofseries |
Worklist;17527 |
|
dc.subject |
Information security |
en_US |
dc.subject |
Graphical passwords |
en_US |
dc.subject |
Password patterns |
en_US |
dc.subject |
User authentication |
en_US |
dc.subject |
User studies |
en_US |
dc.title |
The pattern-richness of graphical passwords |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Vorster, J., Van Heerden, R. P., & Irwin, B. (2016). The pattern-richness of graphical passwords. IEEE. http://hdl.handle.net/10204/9389 |
en_ZA |
dc.identifier.chicagocitation |
Vorster, JS, Renier P Van Heerden, and B Irwin. "The pattern-richness of graphical passwords." (2016): http://hdl.handle.net/10204/9389 |
en_ZA |
dc.identifier.vancouvercitation |
Vorster J, Van Heerden RP, Irwin B, The pattern-richness of graphical passwords; IEEE; 2016. http://hdl.handle.net/10204/9389 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Vorster, JS
AU - Van Heerden, Renier P
AU - Irwin, B
AB - Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as ”password”, ”admin” or ”12345”. Patterns may similarly be detected in the use of Graphical passwords (GPs). The most significant such pattern – reported by many researchers – is hotspot clustering. This paper qualitatively analyses more than 200 graphical passwords for patterns other than the classically reported hotspots. The qualitative analysis finds that a significant percentage of passwords fall into a small set of patterns; patterns that can be used to form attack models against GPs. In counter action, these patterns can also be used to educate users so that future password selection is more secure. It is the hope that the outcome from this research will lead to improved behaviour and an enhancement in graphical password security.
DA - 2016-08
DB - ResearchSpace
DP - CSIR
KW - Information security
KW - Graphical passwords
KW - Password patterns
KW - User authentication
KW - User studies
LK - https://researchspace.csir.co.za
PY - 2016
SM - 978-1-5090-2473-5
T1 - The pattern-richness of graphical passwords
TI - The pattern-richness of graphical passwords
UR - http://hdl.handle.net/10204/9389
ER -
|
en_ZA |