Can background baroque music help to improve the memorability of graphical passwords?
Graphical passwords have been proposed as an alternative to alphanumeric passwords with their advantages in usability and security. However,they still tend to follow predictable patterns that are easier for attackers to exploit,probably due to users’ memory limitations. Various literatures show that...
| Main Authors: | Gao, Haichang, Chang, Xiuling, Ren, Zhongjie, Aickelin, Uwe, Wang, Liming |
|---|---|
| Other Authors: | Campilho, Aurélio |
| Format: | Book Section |
| Published: |
Springer
2010
|
| Online Access: | https://eprints.nottingham.ac.uk/1353/ |
Similar Items
The effect of baroque music on the PassPoints graphical password
by: Gao, Haichang, et al.
Published: (2010)
by: Gao, Haichang, et al.
Published: (2010)
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010)
by: Wang, Liming, et al.
Published: (2010)
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
Draw a line on your PDA to authenticate
by: Liu, Xiyang, et al.
Published: (2010)
by: Liu, Xiyang, et al.
Published: (2010)
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Bowings and fingerings technique in Baroque music / Zaleelah Borhan
by: Borhan, Zaleelah
Published: (2008)
by: Borhan, Zaleelah
Published: (2008)
The absence of Baroque ornamentation in performing baroque music on the classical guitar among UiTM music students / Muhammad Adil Putera Badrul Hisham
by: Badrul Hisham, Muhammad Adil Putera
Published: (2013)
by: Badrul Hisham, Muhammad Adil Putera
Published: (2013)
Combinatoric Drag–Pattern-Graphical-Password (DPGP)
by: Sylla, Mohamed, et al.
Published: (2013)
by: Sylla, Mohamed, et al.
Published: (2013)
On the use of image and emojis in graphical password application
by: Zabidi, Nur Syabila, et al.
Published: (2019)
by: Zabidi, Nur Syabila, et al.
Published: (2019)
Study and develop a new graphical password system
by: Eljetlawi, Ali Mohamed
Published: (2008)
by: Eljetlawi, Ali Mohamed
Published: (2008)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Baroque Historical Dances Lecture and Workshop by Mireia Frutos Fernandez : World Music History Lecture Series
by: Universiti Teknologi MARA, Faculty of Music
Published: (2018)
by: Universiti Teknologi MARA, Faculty of Music
Published: (2018)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Ghani Format Learning Method (GFLM) helps memorizing difficult facts
by: Siti Sarah, Mohamad Rajimi
Published: (2017)
by: Siti Sarah, Mohamad Rajimi
Published: (2017)
The effeciancy of memorizing piano piece in helping piano students to perform in Faculty of Music, UiTM Shah Alam / Amira Eva Sherin Roslan
by: Roslan, Amira Eva Sherin
Published: (2016)
by: Roslan, Amira Eva Sherin
Published: (2016)
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
by: Cheong, S., et al.
Published: (2014)
by: Cheong, S., et al.
Published: (2014)
A PROTOTYPE OF HOTEL MANAGEMENT SYSTEM WITH A SECURED GRAPHICAL PASSWORD TO AVOID SHOULDER SURFING ATTACK
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
by: Deshinta, Arrova Dewi, et al.
Published: (2018)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
‘Such a ceremonial perversion!’
baroque, capitalism, and a mouthful of birds
by: Beyad, Maryam Soltan, et al.
Published: (2013)
by: Beyad, Maryam Soltan, et al.
Published: (2013)
The memory of memorizers: a study of the memorization of Quran
by: Dzulkifli, Mariam Adawiah, et al.
Published: (2014)
by: Dzulkifli, Mariam Adawiah, et al.
Published: (2014)
The effect of background music on the taste of wine
by: North, Adrian
Published: (2012)
by: North, Adrian
Published: (2012)
Forgetfulness can help you win games
by: Burridge, James, et al.
Published: (2015)
by: Burridge, James, et al.
Published: (2015)
Enhancing image-emoji graphical password multi-factor authentication by utilizing single touch and multi-touch gesture
by: Roslan, Nuur Alifah, et al.
Published: (2024)
by: Roslan, Nuur Alifah, et al.
Published: (2024)
The techniques of memorization music pieces: a case study of students of Faculty of Music Shah Alam / Mohd Rizal Mohd Man Sha
by: Mohd Man Sha, Mohd Rizal
Published: (2013)
by: Mohd Man Sha, Mohd Rizal
Published: (2013)
The preservation of provincial identity in baroque influenced artistic architectural structure at Kampung Cina, Terengganu
by: Nurkhazilah Idris,, et al.
Published: (2021)
by: Nurkhazilah Idris,, et al.
Published: (2021)
Fundamental to password based security
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Password practices of Swedish websites
by: Lim, Nena, et al.
Published: (2010)
by: Lim, Nena, et al.
Published: (2010)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Picture-Based Password Scheme
by: Seow, Yang Jiin
Published: (2019)
by: Seow, Yang Jiin
Published: (2019)
Second Level Password Generator
by: Tay, Choo Chuan, et al.
Published: (2010)
by: Tay, Choo Chuan, et al.
Published: (2010)
Different types of bowing technique for violin in the baroque and romantic eras / Izzat Syazwan Ab Halim
by: Ab Halim, Izzat Syazwan
Published: (2013)
by: Ab Halim, Izzat Syazwan
Published: (2013)
Analysis of cognitive flexibility by using EEG in the presence of background music
by: Ng, Jian Tong
Published: (2018)
by: Ng, Jian Tong
Published: (2018)
An audio CAPTCHA to distinguish humans from computers
by: Haichang, Gao, et al.
Published: (2010)
by: Haichang, Gao, et al.
Published: (2010)
Memorial to a memorable event
by: Ibrahim, Rahinah, et al.
Published: (2010)
by: Ibrahim, Rahinah, et al.
Published: (2010)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
Password Usage: An Analysis in Academic Institution
by: M. N. M., Kahar, et al.
Published: (2007)
by: M. N. M., Kahar, et al.
Published: (2007)
DNA approach for password conversion generator
by: Chng, Chern Wei
Published: (2014)
by: Chng, Chern Wei
Published: (2014)
Authentication tool for picture based passwords
by: Goh, Wen Bin
Published: (2014)
by: Goh, Wen Bin
Published: (2014)
Similar Items
-
The effect of baroque music on the PassPoints graphical password
by: Gao, Haichang, et al.
Published: (2010) -
Against spyware using CAPTCHA in graphical password scheme
by: Wang, Liming, et al.
Published: (2010) -
A new graphical password scheme resistant to shoulder-surfing
by: Haichang, Gao, et al.
Published: (2010) -
Draw a line on your PDA to authenticate
by: Liu, Xiyang, et al.
Published: (2010) -
Graphical password security model
by: Hameed, Shihab A., et al.
Published: (2011)