Graphical authentication: justifications and objectives

Pierce, J., Warren, Matthew, Mackay, David and Wells, Jason 2004, Graphical authentication: justifications and objectives, in Proceedings of the 2nd Australian Information Security Management Conference: securing the future, Edith Cowan University, Perth, W.A., pp. 49-55.

Attached Files
Name Description MIMEType Size Downloads

Title Graphical authentication: justifications and objectives
Author(s) Pierce, J.
Warren, MatthewORCID iD for Warren, Matthew
Mackay, David
Wells, JasonORCID iD for Wells, Jason
Conference name Australian Information Security Management. Conference (2nd : 2004 : Perth, Western Australia)
Conference location Perth, Western Australia
Conference dates 26 November 2004
Title of proceedings Proceedings of the 2nd Australian Information Security Management Conference: securing the future
Editor(s) [Unknown]
Publication date 2004
Conference series Australian Information Security Management Conference
Start page 49
End page 55
Publisher Edith Cowan University
Place of publication Perth, W.A.
Keyword(s) authentication
human-computer interaction
IT Security
Summary Password authentication has failed to address the compounding business requirement for increased security. Biometric authentication is beginning to address the need for tighter security, but it costs several orders of magnitude more than basic password implementations. Biometric authentication also possesses several shortcomings that inhibit its widespread adoption. In this paper we describe the trends in the literature before presenting the justifications and objectives for graphical authentication: a viable alternative to both biometrics and passwords. We also intend the paper to serve as a
prelude to forthcoming implementation and validation research.
Notes This item is located on page 49 on the attached link.
ISBN 0729805727
Language eng
Field of Research 080199 Artificial Intelligence and Image Processing not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2004 2nd Australian Information Security Management Conference
Persistent URL

Document type: Conference Paper
Collection: School of Information and Business Analytics
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 1421 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 09:47:45 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact