54 research outputs found

    The effect of baroque music on the PassPoints graphical password

    Get PDF
    Graphical passwords have been demonstrated to be the possible alternatives to traditional alphanumeric passwords. However, they still tend to follow predictable patterns that are easier to attack. The crux of the problem is users’ memory limitations. Users are the weakest link in password authentication mechanism. It shows that baroque music has positive effects on human memorizing and learning. We introduce baroque music to the PassPoints graphical password scheme and conduct a laboratory study in this paper. Results shown that there is no statistic difference between the music group and the control group without music in short-term recall experiments, both had high recall success rates. But in long-term recall, the music group performed significantly better. We also found that the music group tended to set significantly more complicated passwords, which are usually more resistant to dictionary and other guess attacks. But compared with the control group, the music group took more time to log in both in short-term and long-term tests. Besides, it appears that background music does not work in terms of hotspots

    A new graphical password scheme resistant to shoulder-surfing

    Get PDF
    Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or by recording the authentication session. Due to the visual interface, this problem has become exacerbated in graphical passwords. There have been some graphical schemes resistant or immune to shoulder-surfing, but they have significant usability drawbacks, usually in the time and effort to log in. In this paper, we propose and evaluate a new shoulder-surfing resistant scheme which has a desirable usability for PDAs. Our inspiration comes from the drawing input method in DAS and the association mnemonics in Story for sequence retrieval. The new scheme requires users to draw a curve across their password images orderly rather than click directly on them. The drawing input trick along with the complementary measures, such as erasing the drawing trace, displaying degraded images, and starting and ending with randomly designated images provide a good resistance to shoulder-surfing. A preliminary user study showed that users were able to enter their passwords accurately and to remember them over time

    The effect of baroque music on the PassPoints graphical password

    Get PDF
    Graphical passwords have been demonstrated to be the possible alternatives to traditional alphanumeric passwords. However, they still tend to follow predictable patterns that are easier to attack. The crux of the problem is users’ memory limitations. Users are the weakest link in password authentication mechanism. It shows that baroque music has positive effects on human memorizing and learning. We introduce baroque music to the PassPoints graphical password scheme and conduct a laboratory study in this paper. Results shown that there is no statistic difference between the music group and the control group without music in short-term recall experiments, both had high recall success rates. But in long-term recall, the music group performed significantly better. We also found that the music group tended to set significantly more complicated passwords, which are usually more resistant to dictionary and other guess attacks. But compared with the control group, the music group took more time to log in both in short-term and long-term tests. Besides, it appears that background music does not work in terms of hotspots

    Abrupt climatic events recorded by the Ili loess during the last glaciation in Central Asia: Evidence from grain-size and minerals

    Get PDF
    The loess record of Central Asia provides an important archive of regional climate and environmental changes. In contrast to the widely investigated loess deposits in the Chinese Loess Plateau, Central Asian loess-paleosol sequences remain poorly understood. Here, we present an aeolian loess section in the southern Ili Basin. Based on granularity and mineralogical analyses, we reconstruct climatic changes during the last glaciation. The results indicated that most of the abrupt climatic events (such as Dansgaard-Oeschger events and Heinrich events) were imprinted in this loess section, although their amplitudes and ages showed some differences. Compared with the millennial oscillations recoded in loess and stalagmites in East Asia, the arid Central Asia responded more sensitively to the warming events than to the cooling events. The shifting trajectory of westerlies across Central Asia played an important role in dust deposition during the stadials. The North Atlantic climatic signals may have been transmitted from Central Asia to the East Asian monsoon regions via the westerlies

    Impact of fracturing liquid absorption on the production and water-block unlocking for shale gas reservoir

    Get PDF
    A large amount of liquid is pumped into the shale gas reservoir during hydraulic fracturing, and the fluid flowback ratio is usually low. However, field experience showed that the liquids did not cause severe damage to shale gas reservoir. It is urgent to clarify the water block unlocking mechanism of a shale gas reservoir. This work is to discuss the water block unlocking mechanism in shale gas reservoir. Based on the characteristic study of shale gas formation, the fracturing fluid absorption mechanism, absorption ability and impact on shale gas formation damage are systematically studied. Study shows that ultra-low water saturation, abundant micro- to nano- tubulars and a huge contact area are the control factors for strong fluid absorption ability of gas-shale. The strong water absorption capacity of the shale gas formation matrix is a key factor in removing water block. Organic matter also has an important influence on absorption ability and gas production. A conceptual evaluation criterion for water block unlocking is proposed based on core absorption capacity, original water saturation and fracture density. The shut-in after hydraulic fracturing is beneficial to gas production and can reduce water production for certain shale gas reservoir.Cited as: Shen, Y., Ge, H., Zhang, X., Chang, L., Liu, D., Liu, J. Impact of fracturing liquid absorption on the production and water-block unlocking for shale gas reservoir. Advances in Geo-Energy Research, 2018, 2(2): 163-172, doi: 10.26804/ager.2018.02.0

    A new graphical password scheme resistant to shoulder-surfing

    Get PDF
    Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or by recording the authentication session. Due to the visual interface, this problem has become exacerbated in graphical passwords. There have been some graphical schemes resistant or immune to shoulder-surfing, but they have significant usability drawbacks, usually in the time and effort to log in. In this paper, we propose and evaluate a new shoulder-surfing resistant scheme which has a desirable usability for PDAs. Our inspiration comes from the drawing input method in DAS and the association mnemonics in Story for sequence retrieval. The new scheme requires users to draw a curve across their password images orderly rather than click directly on them. The drawing input trick along with the complementary measures, such as erasing the drawing trace, displaying degraded images, and starting and ending with randomly designated images provide a good resistance to shoulder-surfing. A preliminary user study showed that users were able to enter their passwords accurately and to remember them over time

    Against spyware using CAPTCHA in graphical password scheme

    Get PDF
    Text-based password schemes have inherent security and usability problems, leading to the development of graphicalpassword schemes. However, most of these alternate schemes are vulnerable to spyware attacks. We propose a new scheme, using CAPTCHA (Completely Automated Public Turing tests to tell Computers and Humans Apart) that retaining the advantages of graphical password schemes, while simultaneously raising the cost of adversaries by orders of magnitude. Furthermore, some primary experiments are conducted and the results indicate that the usability should be improved in the future work
    corecore