2009 Canadian Conference on Electrical and Computer Engineering 2009
DOI: 10.1109/ccece.2009.5090247
|View full text |Cite
|
Sign up to set email alerts
|

Noisy password scheme: A new one time password system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Users simply sit in front of the system, perform a one-time calibration and then begin using the system. We compared the password entry speed and error rates of three approaches: a standard keyboard for entering a password (Keyboard) to provide a baseline, the noisy password technique [12] and PEN. At the end of the study we asked subjects to fill out a survey to collect data on the user's subjective opinion of the techniques.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Users simply sit in front of the system, perform a one-time calibration and then begin using the system. We compared the password entry speed and error rates of three approaches: a standard keyboard for entering a password (Keyboard) to provide a baseline, the noisy password technique [12] and PEN. At the end of the study we asked subjects to fill out a survey to collect data on the user's subjective opinion of the techniques.…”
Section: Discussionmentioning
confidence: 99%
“…The users were shown the password immediately before they were asked to enter it. Each subject was first trained on the three methods: Keyboard, the noisy password technique [12] and PEN. Subjects were trained on using each of the techniques on a practice set of four passwords of variable length.…”
Section: Methodsmentioning
confidence: 99%
“…Alghathbar and Mahmoud [8], has attempted to alleviate the problem of shoulder surfing or eves dropping by making the replay of a password useless by designing a noisy password scheme.…”
Section: Related Workmentioning
confidence: 99%
“…After receiving a correct OTP, the verifier is entitled to believe that the user has possession of the device capable of generating or receiving the OTP. While there can be many ways to generate OTPs [20,5], there are Informational and Internet Standard RFCs published detailing standard OTP algorithms [16,17]. Figure 1 gives a high-level overview of a generic Web 2FA authentication sequence.…”
Section: Authentication Modelsmentioning
confidence: 99%