跳到主要內容

臺灣博碩士論文加值系統

(44.192.20.240) 您好!臺灣時間:2024/02/27 11:57
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳郁潔
研究生(外文):Yu Chieh Chen
論文名稱:探討圖形密碼系統的可記憶性─使用者與攻擊者觀點
論文名稱(外文):Exploring Memorability of Graphical Password Systems:the Perspectives of Users and Attackers
指導教授:廖耕億廖耕億引用關係
指導教授(外文):G. Y. Liao
學位類別:碩士
校院名稱:長庚大學
系所名稱:資訊管理學研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
論文頁數:82
中文關鍵詞:圖形密碼系統記憶塗鴉切割
外文關鍵詞:graphical password systemmemorydoodlingcutting
相關次數:
  • 被引用被引用:1
  • 點閱點閱:358
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
隨著驗證系統的使用越來越頻繁,密碼的記憶負擔也就越來越重,因此,在圖優效應的基礎上,發展出了圖形密碼的驗證方式。有鑒於一般圖形密碼系統在增加使用者記憶的同時,也讓攻擊者對於密碼的記憶增加,因此,我們加入了塗鴉與切割的方式,希望讓使用者對密碼圖的記憶加深,又同時讓攻擊者對於密碼圖的記憶降低。
在研究的過程中,我們採取了實驗法,讓受試者去實際地操作系統,並於實驗中記綠受試者登入的過程,將其記錄以統計方法分析之。在實驗的最後,我們加入了探索性研究,以問卷的方式去了解受試者對於新系統的接受度與一般圖形密碼系統是否有顯著差異。
我們發現經過一段時間後,塗鴉與切割對於使用者的可記憶性是具有顯著影響的,此外,切割的動作也顯著影響到攻擊者對於密碼圖的記憶。在問卷的分析中,使用本系統的受試者在績效期望與行為意圖上相較於一般圖形密碼系統,都有顯著的正面反應。
With more and more use of authentication systems, the passwords are the increasingly heavy burden of memory. Base on picture superiority effect, some developed an alternative - graphical password system. In view of the general graphical password systems, they always try to increase the user’s memory for passwords, but also allow attackers to do it. Therefore, we join the doodle and cutting actions to enhance the user’s memory for passwords and reduce the attacker’s at the same time.

In the process of the study, we used an experiment to guide participants to operate our system, and all actions in experiment were recorded to analyze. At the end of experiment, we joined the exploratory study by questionnaires to understand the differences of users’ acceptances between our system and the general graphical password system.

We found that doodle and cutting actions have significant positive impact on users’ memories after a period of time. In addition, cutting action has significant negative impact on attackers' memories for passwords. By analysis of the questionnaires, we found the participants who using our system have significant positive responses in performance expectancy and behavioral intention.
指導教授推薦書
口試委員會審定書
授權書 iii
誌謝 iv
中文摘要 v
英文摘要 vi
目錄 vii
圖目錄 x
表目錄 xi
第一章 緒論 1
1.1 研究背景 1
1.2 研究動機 4
1.3 研究目的 5
第二章 文獻探討 7
2.1 圖形密碼系統 7
2.1.1 各類型圖形密碼介紹 7
2.1.2 多圖中選取密碼圖之圖形密碼 15
2.1.3 防肩窺機制 16
2.2 圖像記憶 23
2.2.1 圖優效應 24
2.2.2 影響圖片記憶效果的因素 25
2.2.3 UTAUT 28
第三章 研究設計 30
3.1 研究架構 31
3.2 變項操作型定義 33
3.3 系統介紹 35
3.4 實驗設計 38
3.4.1 實驗參與者 39
3.4.2 實驗設備與材料 40
3.4.3 實驗流程 41
3.5 實驗分析方法 44
第四章 資料分析 45
4.1 使用者可記憶性分析 47
4.2 攻擊者可記憶性分析 50
4.3 系統接受度分析 54
4.4 延伸討論 56
第五章 結論 60
5.1 研究結論 60
5.2 研究建議 63
5.3 研究限制 63
5.4 未來研究方向 64
參考文獻 65
附錄 69

圖目錄
圖 2.1.1: PASSPOINTS系統圖 8
圖 2.1.2:PASSFACES系統圖 10
圖 2.1.3:UNDERCOVER使用示意圖 11
圖 2.1.4:UNDERCOVER禁止圖之設計 11
圖 2.1.5:BDAS圖 14
圖 2.1.6:DÉJÀ VU系統圖 15
圖 2.1.7:CONVEX-HULL圖 17
圖 2.1.8:MOVEABLE FRAME SCHEME圖 18
圖 2.1.9:SPECIAL GEOMETRIC CONFIGURATION圖 18
圖 2.1.10:PICT-O-LOCK圖 19
圖 2.1.11:防肩窺機制(SSR)圖 20
圖 2.2.1:UTAUT 28
圖 3.1.1:研究架構圖 31
圖 3.3.1:GPS註冊過程 36
圖 3.3.2:A組登入過程 38
圖 3.3.3:B組登入過程 38
圖 3.4.1:受試者座位分配示意圖 41
圖 3.4.2:實驗流程圖 42

表目錄
表 3.5.1:使用電腦之時間分布(小時) 45
表 3.5.2:驗證系統組數分布 46
表 3.5.3:帳號密碼組數分布 46
表 3.5.4:自信程度分布 46
表 4.1.1:第一階段記憶實驗(秒) 48
表 4.1.2:第二階段記憶實驗(秒) 49
表 4.1.3:兩階段登入時間 50
表 4.2.1:第一階段肩窺實驗(秒) 51
表 4.2.2:第二階段肩窺實驗(秒) 52
表 4.2.3:肩窺平均成功登入次數 53
表 4.3.1:問卷各構面平均值 55
表 5.1.1:假說整理表 62
[1] Adams, A. and M.A. Sasse, "Users Are Not The Enemy", Communications of the ACM, vol. 42, no. 12, pp. 41-46, 1999.
[2] Andress, M., Password-by-number, http://www.infoworld.com/articles/op/xml/02/04/08/020408opsecurity.html.
[3] Angeli, A.D., et al., "Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems", Int. J. Human-Computer Studies, vol. 63, no. 1-2, pp. 128-152, 2005.
[4] Armstrong, L., And the Password Is...#%?@&! , in Business Week,. 2002.
[5] Bersch, C., Outdated, Insecure Passwords Are Losing Money for Internet Businesses, in Communications News. 2000.
[6] Blonder, G., Graphical Passwords. 1996: United States.
[7] Brown, A.S., et al., "Generating and Remembering Passwords", Applied Cognitive Psychology, vol. 18, no. 6, pp. 641-651, 2004.
[8] Dhamija, R. and A. Perrig, "Deja Vu: A User Study. Using Images for Authentication." in Proceedings of the 9th USENIX Security Symposium, University of California, Berkeley, CA, 2000, pp. 1-14.
[9] Dunphy, P. and J. Yan, Do Background Images Improve “Draw a Secret”Graphical Passwords?, in Communications Security. 2007: Alexandria, Virginia, USA. p. 1-12.
[10] Furmanski, C.S. and S.A. Engel, "Perceptual Learning in Object Recognition: Object Specificity And Size Invariance", Vision research, vol. 40, no. 5, pp. 473-484, 2000.
[11] Hafiz, M.D., et al., Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique, in Second Asia International Conference on Modelling & Simulation(AMS). 2008, IEEE Computer Society Washington, DC, USA. p. 396-403.
[12] Hong, D., et al., "A Graphical Password Scheme Strongly Resistant to Spyware", in In Proceedings of International conference on security and management, Las Vergas, NV, 2004, pp. 1-7.
[13] Joseph, G., H. Jennifer, and S. Vibha, Doodling Our Way to Better Authentication, in CHI '02 extended abstracts on Human factors in computing systems. 2002, ACM: Minneapolis, Minnesota, USA. p. 868-869.
[14] Karen, R., "On User Involvement in Production of Images Used in Visual Authentication", Journal of Visual Languages and Computing, vol. 20, no. 1, pp. 1-15, 2009.
[15] Komanduri, S. and D.R. Hutchings, "Order and Entropy in Picture Passwords", in Proceedings of Graphics interface 2008, Windsor, Ontario, Canada 2008, pp. 115-122.
[16] Leonardo, S. and J.C. Birget, Graphical passwords. 2002, The Rutgers Scholar.
[17] Lidwell, W., K. Holden, and J. Butler Universal Principles of Design. USA, Quayside Pub Group, 2003.
[18] Likert, R., "A Technique for the Measurement of Attitudes", Archives of Psychology, vol. 22, no. 140, pp. 1-55, 1932.
[19] Loftus, G.R., "Tachistoscopic Simulations of Eye Fixations on Pictures", Journal of Experimental Psychology: Human Learning and Memory, vol. 7, no. 5, pp. 369-376, 1981.
[20] Loftus, G.R. and N.H. Mackworth, "Cognitive Determinants of Fixation Location During Picture Viewing", Journal of Experimental Psychology: Human Perception and Performance, vol. 4, no. 4, pp. 565-572, 1978.
[21] Loftus, G.R., W.W. Nelson, and H.J. Kallman, "Differential Acquisition Rates For Different Types of Information From Pictures ", The Quarterly journal of experimental psychology. A, Human experimental psychology vol. 35, no. 1, pp. 187-198, 1983.
[22] Nelson, D.L., U.S. Reed, and J.R. Walling, "Pictorial Superiority Effect", Journal of Experimental Psychology: Human Learning & Memory, vol. 2, pp. 523-528, 1976.
[23] Norman, D.A., The Design of Everyday Things. New York, 1988.
[24] Pezdek, K., et al., "Picture Memory: Recognizing Added and Deleted Details", Journal of Experimental Psychology: Learning, Memory, and Cognition, vol. 14, no. 3, pp. 468-476, 1988.
[25] Sasamoto, H., N. Christin, and E. Hayashi, "Undercover: Authentication Usable in Front of Prying Eyes", in Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems, Florence, Italy, 2008, pp. 183-192.
[26] Sobrado, L. and J. Birget, Graphical Passwords in The Rutgers Scholar. 2002, An Electronic Bulletin of Undergraduate Research, Rutgers University, New Jersey.
[27] Standing, L., J. Conezio, and R.N. Haber, "Learning 10,000 Pictures", Quarterly Journal of Experimental Psychology vol. 2, no. 52, pp. 207-222, 1973.
[28] Thorpe, J. and P.C.v. Oorschot, "Graphical Dictionaries and the Memorable Space of Graphical Passwords", in the 13th USENIX Security Symposium, San Diego, CA, USA, 2004, pp. 1-17.
[29] Tversky, B. and T. Sherman, "Picture Memory Improves with Longer On Time and Off", Journal of Experimental Psychology (Human Learning and Memory), vol. 104, no. 2, pp. 114-118, 1975.
[30] Venkatesh, V., et al., "User Acceptance of Information Technology Toward a Unified View", MIS Quarterly, vol. 27, no. 3, pp. 425-478, 2003.
[31] Wiedenbeck, S., et al., "Authentication Using Graphical Passwords:Effects of Tolerance and Image Choice", in Symposium On Usable Privacy and Security, USA, 2005, pp. 1-12.
[32] Wiedenbeck, S., et al., "PassPoints: Design and Longitudinal Evaluation of a Graphical Password System", Int. J. Human-Computer Studies, vol. 63, no. 1-2, pp. 102-127, 2005.
[33] Yan, J., et al., "Password Memorability and Security: Empirical Results", IEEE Security & Privacy, vol. 2, no. 5, pp. 25-31, 2004.
[35]邱皓政,《量化研究法(二)統計原理與分析技術》,台北市,雙
葉書廊,民國九十五年。
[36]胡龍騰,黃瑋瑩,潘中道合譯,《研究方法步驟化學習指南》,
台北市,學富文化,民國八十九年。
[37] 高旻邦譯,《SPSS在心理學的應用-SPSS視窗版使用指南》,台
北市,五南書局,民國九十一年。
[38]張國財,〈使用圖形化通行碼之使用者身份認證設計的研究〉,
私立輔仁大學,碩士論文,民國九十五年。
[39] 彭聃齡,張必隱,《認知心理學》,台北市,東華書局,民國八
十八年。
[40] 葉重新,《心理學》,台北市,心理出版社,民國八十八年。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top