• Publications
  • Influence
Graphical passwords: Learning from the first twelve years
This article first catalogues existing approaches, highlighting novel features of selected schemes and identifying key usability or security advantages, and reviews usability requirements for knowledge-based authentication as they apply to graphical passwords. Expand
Graphical Password Authentication Using Cued Click Points
This work proposes and examines the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique, and suggests that CCP provides greater security than PassPoints because the number of images increases the workload for attackers. Expand
Influencing users towards better passwords: persuasive cued click-points
This work uses persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more secure, click-points in the Cued Click-Points graphical password scheme. Expand
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
This paper uses persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more difficult to guess, click-points. Expand
Scale-free geometry in OO programs
Though conventional OO design suggests programs should be built from many small objects, like Lego bricks, they are instead built from objects that are scale-free, like fractals, and unlike LegoExpand
A Usability Study and Critique of Two Password Managers
A usability study of two recent password manager proposals: PwdHash and Password Multiplier are presented: users were uncomfortable with "relinquishing control of their passwords to a manager, did not feel that they needed the password managers, or that the managers provided greater security. Expand
The Password Life Cycle: User Behaviour in Managing Passwords
A password life cycle is identified that follows users’ password behaviour and how it develops over time as users adapt to changing circumstances and demands and is suggested that new approaches could be designed that harness existing user behaviour while limiting negative consequences. Expand
A second look at the usability of click-based graphical passwords
Significant differences in the usability results of the two studies are found, providing empirical evidence that relying solely on lab studies for security interfaces can be problematic and whether more memorable passwords are necessarily weaker in terms of security. Expand
The Social Nature of Agile Teams
An understanding of how social identity and collective effort are supported by agile methods is supported. Expand
User interface design affects security: patterns in click-based graphical passwords
Using data from four different but closely related click-based graphical password studies, it is shown that user-selected passwords vary considerably in their predictability, and post-hoc analysis looks at click-point patterns within passwords shows that PassPoints passwords follow distinct patterns. Expand