Security

Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface

Download Now Free registration required

Executive Summary

The design of authentication protocols, for online banking services in particular and any service that is of sensitive nature in general, is quite challenging. Indeed, enforcing security guarantees has overhead thus imposing additional computation and design considerations that do not always meet usability and user requirements. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users' trust in the system. In this paper, the authors demonstrate how careful visualization design can enhance not only the security but also the usability of the authentication process. To that end, they propose a family of visualized authentication protocols, a visualized transaction verification, and a "Decrypt able to their eyes only" protocol.

  • Format: PDF
  • Size: 356.35 KB