Entry Zhao:2015:PGA from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Zhao:2015:PGA,
  author =       "Ziming Zhao and Gail-Joon Ahn and Hongxin Hu",
  title =        "Picture Gesture Authentication: Empirical Analysis,
                 Automated Attacks, and Scheme Evaluation",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "4",
  pages =        "14:1--14:??",
  month =        apr,
  year =         "2015",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2701423",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Apr 24 17:39:52 MDT 2015",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Picture gesture authentication has been recently
                 introduced as an alternative login experience to
                 text-based password on touch-screen devices. In
                 particular, the newly on market Microsoft Windows 8TM
                 operating system adopts such an alternative
                 authentication to complement its traditional text-based
                 authentication. We present an empirical analysis of
                 picture gesture authentication on more than 10,000
                 picture passwords collected from more than 800 subjects
                 through online user studies. Based on the findings of
                 our user studies, we propose a novel attack framework
                 that is capable of cracking passwords on previously
                 unseen pictures in a picture gesture authentication
                 system. Our approach is based on the concept of
                 selection function that models users' thought processes
                 in selecting picture passwords. Our evaluation results
                 show the proposed approach could crack a considerable
                 portion of picture passwords under different settings.
                 Based on the empirical analysis and attack results, we
                 comparatively evaluate picture gesture authentication
                 using a set of criteria for a better understanding of
                 its advantages and limitations.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries