The paper presents a comparative study of software‐based user authentication techniques, contrasting the use of traditional password and personal identifier numbers (PIN) against alternative methods involving question and answer responses and graphical representation. All methods share the common basis of some secret knowledge and rely upon the user’s ability to recall it in order to achieve authentication. An experimental trial is described, along with the results based upon 27 participants. The alternative methods are assessed in terms of practical effectiveness (in this context relating to the participant’s ability to authenticate themselves a significant time after initial use of the methods), as well as the perceived levels of user friendliness and security that they provide. The investigation concludes that while passwords and PIN approaches garner good ratings on the basis of their existing familiarity to the participants, other methods based upon image recall and cognitive questions also achieved sufficiently positive results to suggest them as viable alternatives in certain contexts.
Article navigation
1 August 2002
This article was originally published in
Information Management & Computer Security
Research Article|
August 01 2002
An experimental comparison of secret‐based user authentication technologies Available to Purchase
I. Irakleous;
I. Irakleous
Research Student, Network Research Group, Department of Communication and Electronic Engineering, University of Plymouth, Plymouth, UK
Search for other works by this author on:
S.M. Furnell;
S.M. Furnell
Head of Group, Network Research Group, Department of Communication and Electronic Engineering, University of Plymouth, Plymouth, UK
Search for other works by this author on:
P.S. Dowland;
P.S. Dowland
Lecturer, Network Research Group, Department of Communication and Electronic Engineering, University of Plymouth, Plymouth, UK
Search for other works by this author on:
M. Papadaki
M. Papadaki
Research Student, Network Research Group, Department of Communication and Electronic Engineering, University of Plymouth, Plymouth, UK
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5805
Print ISSN: 0968-5227
© MCB UP Limited
2002
Information Management & Computer Security (2002) 10 (3): 100–108.
Citation
Irakleous I, Furnell S, Dowland P, Papadaki M (2002), "An experimental comparison of secret‐based user authentication technologies". Information Management & Computer Security, Vol. 10 No. 3 pp. 100–108, doi: https://doi.org/10.1108/09685220210431854
Download citation file:
288
Views
Suggested Reading
Information owners, custodians and users
Information Management & Computer Security (October,1996)
Domain names management: a strategy for electronic commerce security
Information Management & Computer Security (December,2001)
Software Auditing: Effectively Combating the Five Deadly Sins
Information Management & Computer Security (February,1993)
PC protection
Facilities (August,1990)
So long, and thanks for only using readily available scripts
Information and Computer Security (March,2017)
Related Chapters
Chapter 4 The Effectiveness of Commercial Diplomacy: A Survey Among Embassies and Consulates
Commercial Diplomacy and International Business: A Conceptual and Empirical Exploration
New Forms of Advertising in Television: Types and Effectiveness
Advertising in New Formats and Media: Current Research and Implications for Marketers
How do Initial Signals of Quality Influence the Diffusion of New Medical Products? The Case of New Cancer Drug Treatments
The Economics of Medical Technology
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
