Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Kevin A. Juang"'
Autor:
Joel S. Greenstein, Kevin A. Juang
Publikováno v:
Human Factors: The Journal of the Human Factors and Ergonomics Society. 60:658-668
Objective: We developed a new authentication system based on passphrases instead of passwords. Our new system incorporates a user-generated mnemonic picture displayed during login, definition tooltips, error correction to reduce typographical errors,
Autor:
Joel S. Greenstein, David M. Neyens, Kapil Chalil Madathil, Anand K. Gramopadhye, Kevin A. Juang
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 57:748-752
Numerous Internet-based peer support groups exist to support the informational needs of patients with chronic illnesses. By analyzing the discussions available in the forum of a major ovarian cancer support group, the Ovarian Cancer National Alliance
Autor:
Reshmi Koikkara, Joel S. Greenstein, Kevin A. Juang, Kapil Chalil Madathil, Marlena R. Fraune
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 57:419-423
User-created passwords are typically higher in usability but lower in security than computer-generated passwords. This study evaluates the usability and security of a password scheme in which users are assigned computer-generated random passwords and
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 56:1228-1232
The usability of text-based CAPTCHAs, featuring distorted letters, and image-based CAPTCHAs, featuring pictures, was explored on an Apple iPad. Five conditions were explored: Confident CAPTCHA with either voice or touch input, ESP-PIX with voice or t
Autor:
Kevin A. Juang, Joel S. Greenstein
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 55:1120-1124
The human remains the weakest link in computer security, and one popular method of breaching security is shoulder surfing: looking at a user’s screen or keyboard as he or she enters sensitive input. Various masking techniques exist to hide text fro
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642393440
HCI (27)
HCI (27)
System-generated and user-generated text-based passwords are commonly used to authenticate access to electronic assets. Users typically have multiple web accounts ranging from banking to retail, each with a different password, creating a significant
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6f4b498789cde0213fbf6806bb5df7e8
https://doi.org/10.1007/978-3-642-39345-7_1
https://doi.org/10.1007/978-3-642-39345-7_1
Publikováno v:
Ecology Letters; Mar2021, Vol. 24 Issue 3, p520-532, 13p
Publikováno v:
Ecology Letters; Mar2021, Vol. 24 Issue 3, p580-593, 14p
Autor:
Louis Marinos, Ioannis Askoxylakis
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, he