Skip to main content

Showing 1–6 of 6 results for author: Al-Ameen, M N

Searching in archive cs. Search in all archives.
.
  1. arXiv:1503.02314  [pdf, other

    cs.HC

    Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues

    Authors: Mahdi Nasrullah Al-Ameen, Matthew Wright, Shannon Scielzo

    Abstract: Given the choice, users produce passwords reflecting common strategies and patterns that ease recall but offer uncertain and often weak security. System-assigned passwords provide measurable security but suffer from poor memorability. To address this usability-security tension, we argue that systems should assign random passwords but also help with memorization and recall. We investigate the feasi… ▽ More

    Submitted 8 March, 2015; originally announced March 2015.

    Comments: Will appear at CHI 2015 Conference, to be held at Seoul, Korea

    ACM Class: K.6.5

  2. arXiv:1412.6883  [pdf, ps, other

    cs.CR

    iPersea : The Improved Persea with Sybil Detection Mechanism

    Authors: Mahdi Nasrullah Al-Ameen, Matthew Wright

    Abstract: P2P systems are highly susceptible to Sybil attacks, in which an attacker creates a large number of identities and uses them to control a substantial fraction of the system. Persea is the most recent approach towards designing a social network based Sybil-resistant DHT. Unlike prior Sybil-resistant P2P systems based on social networks, Persea does not rely on two key assumptions: (i) that the soci… ▽ More

    Submitted 22 December, 2014; originally announced December 2014.

    Comments: 10 pages

    ACM Class: C.2.4

  3. arXiv:1408.2852  [pdf, ps, other

    cs.HC cs.CR

    A Comprehensive Study of the GeoPass User Authentication Scheme

    Authors: Mahdi Nasrullah Al-Ameen, Matthew Wright

    Abstract: Before deploying a new user authentication scheme, it is critical to subject the scheme to comprehensive study. Few works, however, have undertaken such a study. Recently, Thorpe et al. proposed GeoPass, the most promising of a class of user authentication schemes based on geographic locations in online maps. Their study showed very high memorability (97%) and satisfactory resilience against onlin… ▽ More

    Submitted 12 August, 2014; originally announced August 2014.

    Comments: 14 pages, 5 figures, 10 tables

    ACM Class: K.6.5

  4. arXiv:1407.7277  [pdf, other

    cs.HC cs.CR

    Q-A: Towards the Solution of Usability-Security Tension in User Authentication

    Authors: Mahdi Nasrullah Al-Ameen, S M Taiabul Haque, Matthew Wright

    Abstract: Users often choose passwords that are easy to remember but also easy to guess by attackers. Recent studies have revealed the vulnerability of textual passwords to shoulder surfing and keystroke loggers. It remains a critical challenge in password research to develop an authentication scheme that addresses these security issues, in addition to offering good memorability. Motivated by psychology res… ▽ More

    Submitted 27 July, 2014; originally announced July 2014.

    Comments: 10 pages, 2 figures, 4 tables

  5. arXiv:1308.0372  [pdf

    cs.HC

    An Intelligent Fire Alert System using Wireless Mobile Communication

    Authors: Mahdi Nasrullah Al-Ameen

    Abstract: The system has come to light through the way of inspiration to develop a compact system, based on the fundamental ideas of safety, security and control. Once this system is installed to operation specifying temperature and smoke threshold, in case of any emergency situation due to increasing temperature and/or smoke at place surpassing the threshold, the system immediately sends automatic alert-no… ▽ More

    Submitted 1 August, 2013; originally announced August 2013.

    Comments: 10 pages, 8 figures, 4 tables

  6. ReDS: A Framework for Reputation-Enhanced DHTs

    Authors: Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew Wright

    Abstract: Distributed Hash Tables (DHTs) such as Chord and Kademlia offer an efficient solution for locating resources in peer-to-peer networks. Unfortunately, malicious nodes along a lookup path can easily subvert such queries. Several systems, including Halo (based on Chord) and Kad (based on Kademlia), mitigate such attacks by using a combination of redundancy and diversity in the paths taken by redundan… ▽ More

    Submitted 21 September, 2012; originally announced September 2012.

    Journal ref: IEEE TPDS Special Issue on Trust, Security, and Privacy, Feb. 2014, Vol. 5, Issue 2