Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/985921.986074acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Passwords you'll never forget, but can't recall

Published: 24 April 2004 Publication History

Abstract

We identify a wide range of human memory phenomena as potential certificates of identity. These "imprinting" behaviors are characterized by vast capacity for complex experiences, which can be recognized without apparent effort and yet cannot be transferred to others. They are suitable for use in near zero-knowledge protocols, which minimize the amount of secret information exposed to prying eyes while identifying an individual. We sketch several examples of such phenomena[1-3], and apply them in secure certification protocols. This provides a novel approach to human-computer interfaces, and raises new questions in several classic areas of psychology.

References

[1]
R. N. Shepard (1967). Recognition memory for words, sentences, and pictures. J Verb Learn Verb Behav 6, 156--163.
[2]
Reber, A. S. (1967). Implicit learning of artificial grammars. Journal of Verbal Learning and Verbal Behavior 6, 855--863.
[3]
A. Salaso, R. M. Shiffrin, and T. C. Feustel (1985). Building Permanent Memory Codes: Codification and Repetition Effects in Word Identification. Journal of Experimental Psychology: General 114(1), 50--77.
[4]
L. Standing, J. Conezio, and R. N. Haber (1970). Perception and memory for pictures: single trial learning of 2500 visual stimuli. Psychol. Sci. 19, 73--74.
[5]
Cave, B. C. (1997). Very long-lasting priming in picture naming. Psychol. Sci 8, 322--325.
[6]
Perruchet, P. and Pacteau, C. (1990). Synthetic grammar learning: Implicit rule abstraction or explicit fragmentary knowledge? Journal of Experimental Psychology: General 119, 264--275.
[7]
E. Tulving, D. L. Schacter, H. A. Stark (1982). Priming effects in word-fragment completion are independent of recognition memory. Journal of Experimental Psychology: Learning, Memory & Cognition 8(4), 336--342.
[8]
G. Musen and A. Treisman (1990). Implicit and Explicit Memory for Visual Patterns. J Exp Psychol Learn Mem Cogn 16(1), 127--37.
[9]
A. Karni and D. Sagi (1993). The time course of learning a visual skill. Nature 365, 250--252.
[10]
R. Dhamija and A. Perrig (2000). Déja vu: A user study using images for authentication. In Proceedings of the 9th USENIX Security Symposium, 2000.
[11]
A press report is given at http://research.microsoft.com/displayArticle.aspx?id=417
[12]
http://www.atstake.com/research/lc
[13]
B. Rossion and G. Pourtois (2001). Revisiting Snodgrass and Vanderwart's object database: Color and Texture improve Object Recognition. Presented at VisionScienceS, Sarasota, FL, May, 2001. Abstract in Journal of Vision.
[14]
J. G. Snodgrass, and M. Vanderwart (1980). A standardized set of 260 pictures: Norms for name agreement, image agreement, familiarity, and visual complexity. Journal of Experimental Psychology: Learning, Memory & Cognition, 6:174--215.
[15]
M. Wilson (2003). MRC Psycholinguistic Database: Machine Usable Dictionary, Version 2.00. Rutherford Appleton Laboratory, Oxfordshire, England.
[16]
W. van Heuven (2003). Pseudo: a nonword/pseudoword generator. NICI, Univeristy of Nijmegen, http://www.nici.kun.nl/~heuven/.

Cited By

View all
  • (2023)A Comparison Between Position-Based and Image-Based Multi-Layer Graphical user Authentication SystemOriental journal of computer science and technology10.13005/ojcst16.01.0316:01(46-60)Online publication date: 30-May-2023
  • (2022)Video Based Graphical Password Authentication SystemProceedings of International Conference on Network Security and Blockchain Technology10.1007/978-981-19-3182-6_7(78-90)Online publication date: 15-Jun-2022
  • (2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI EA '04: CHI '04 Extended Abstracts on Human Factors in Computing Systems
April 2004
975 pages
ISBN:1581137036
DOI:10.1145/985921
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 April 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adaptive interfaces
  2. human memory
  3. identity
  4. passwords
  5. security

Qualifiers

  • Article

Conference

CHI04
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)3
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Comparison Between Position-Based and Image-Based Multi-Layer Graphical user Authentication SystemOriental journal of computer science and technology10.13005/ojcst16.01.0316:01(46-60)Online publication date: 30-May-2023
  • (2022)Video Based Graphical Password Authentication SystemProceedings of International Conference on Network Security and Blockchain Technology10.1007/978-981-19-3182-6_7(78-90)Online publication date: 15-Jun-2022
  • (2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021
  • (2020)Implementation of an Authentication System GTPassAdvanced Multimedia and Ubiquitous Engineering10.1007/978-981-15-9309-3_23(159-164)Online publication date: 17-Dec-2020
  • (2019)AcSIS: Authentication System Based on Image SplicingEngineering, Technology & Applied Science Research10.48084/etasr.30609:5(4808-4812)Online publication date: 9-Oct-2019
  • (2017)Two factor image-based password authentication for junior high school students2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)10.1109/JCSSE.2017.8025913(1-6)Online publication date: Jul-2017
  • (2017)Incorporating homomorphic encryption with hybrid numerical authentication for blind computer users2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT)10.1109/ICICICT1.2017.8342620(536-541)Online publication date: Jul-2017
  • (2017)A Graphical Password Authentication for analyzing legitimate user in online social network and secure social image repository with metadata2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT)10.1109/ICCPCT.2017.8074325(1-7)Online publication date: Apr-2017
  • (2017)Human Computing for Handling Strong Corruptions in Authenticated Key Exchange2017 IEEE 30th Computer Security Foundations Symposium (CSF)10.1109/CSF.2017.31(159-175)Online publication date: Aug-2017
  • (2017)DynamicPIN: A Novel Approach towards Secure ATM Authentication2017 International Conference on Computational Science and Computational Intelligence (CSCI)10.1109/CSCI.2017.11(68-73)Online publication date: Dec-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media