Publication statistics

Pub. period:2007-2011
Pub. count:4
Number of co-authors:7



Co-authors

Number of publications with 3 favourite co-authors:

David Griffiths:
Sacha Brostoff:
Nur Haryani Zakaria:

 

 

Productive colleagues

Jeff Yan's 3 most productive colleagues in number of publications:

Patrick Olivier:39
Paul Dunphy:8
Sacha Brostoff:2
 
 
 

Upcoming Courses

go to course
User-Centred Design - Module 2
Starts tomorrow LAST CALL!
go to course
User Experience: The Beginner's Guide
Starts tomorrow LAST CALL!
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Jeff Yan

 

Publications by Jeff Yan (bibliography)

 what's this?
2011
 
Edit | Del

Zakaria, Nur Haryani, Griffiths, David, Brostoff, Sacha and Yan, Jeff (2011): Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 6. Available online

Graphical passwords are often considered prone to shoulder-surfing attacks, where attackers can steal a user's password by peeking over his or her shoulder in the authentication process. In this paper, we explore shoulder surfing defence for recall-based graphical password systems such as Draw-A-Secret and Background Draw-A-Secret, where users doodle their passwords (i.e. secrets) on a drawing grid. We propose three innovative shoulder surfing defence techniques, and conduct two separate controlled laboratory experiments to evaluate both security and usability perspectives of the proposed techniques. One technique was expected to work to some extent theoretically, but it turned out to provide little protection. One technique provided the best overall shoulder surfing defence, but also caused some usability challenges. The other technique achieved reasonable shoulder surfing defence and good usability simultaneously, a good balance which the two other techniques did not achieve. Our results appear to be also relevant to other graphical password systems such as Pass-Go.

© All rights reserved Zakaria et al. and/or ACM Press

2008
 
Edit | Del

Yan, Jeff and Ahmad, Ahmad Salah El (2008): Usability of CAPTCHAs or usability issues in CAPTCHA design. In: Proceedings of the 2008 Symposium on Usable Privacy and Security 2008. pp. 44-52. Available online

CAPTCHA is now almost a standard security technology, and has found widespread application in commercial websites. Usability and robustness are two fundamental issues with CAPTCHA, and they often interconnect with each other. This paper discusses usability issues that should be considered and addressed in the design of CAPTCHAs. Some of these issues are intuitive, but some others have subtle implications for robustness (or security). A simple but novel framework for examining CAPTCHA usability is also proposed.

© All rights reserved Yan and Ahmad and/or ACM Press

2007
 
Edit | Del

Lin, Di, Dunphy, Paul, Olivier, Patrick and Yan, Jeff (2007): Graphical passwords & qualitative spatial relations. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 161-162. Available online

A potential drawback of graphical password schemes is that they are more vulnerable to shoulder surfing than conventional alphanumeric text passwords. We present a variation of the Draw-a-Secret scheme originally proposed by Jermyn et al [1] that is more resistant to shoulder surfing through the use of a qualitative mapping between user strokes and the password, and the use of dynamic grids to both obfuscate attributes of the user secret and encourage them to use different surface realizations of the secret. The use of qualitative spatial relations relaxes the tight constraints on the reconstruction of a secret; allowing a range of deviations from the original. We describe QDAS (Qualitative Draw-A-Secret), an initial implementation of this graphical password scheme, and the results of an empirical study in which we examined the memorability of secrets, and their susceptibility to shoulder-surfing attacks, for both Draw-A-Secret and QDAS.

© All rights reserved Lin et al. and/or ACM Press

 
Edit | Del

Dunphy, Paul and Yan, Jeff (2007): Is FacePIN secure and usable?. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 165-166. Available online

Personal identification numbers (PINs) and hardware tokens are often used together for authentication purposes, e.g., in financial transactions with ATM machines. However, many people cannot remember their PINs. This has caused insecure practice, extra management cost, or both. In this paper, we evaluate FacePIN, a solution proposed to improve the security and memorability of the PIN scheme.

© All rights reserved Dunphy and Yan and/or ACM Press

 
Add publication
Show list on your website
 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/jeff_yan.html