Understanding visual perceptions of usability and security of Android's graphical password pattern.
Adam J. AvivDane FichterPublished in: ACSAC (2014)
Keyphrases
- graphical password
- user authentication
- malware detection
- intrusion detection
- information security
- access control
- graphical passwords
- attitudes toward
- security policies
- security issues
- security requirements
- key management
- user satisfaction
- real time
- anomaly detection
- software development
- information systems
- data mining