메뉴 건너뛰기




Volumn , Issue , 2004, Pages 236-245

A PIN-entry method resilient against shoulder surfing

Author keywords

ATM; Cognitive trapdoor games; Password; PIN; Shoulder surfing

Indexed keywords

AUTOMATIC TELLER MACHINES; COGNITIVE SYSTEMS; ELECTRONIC COMMERCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS;

EID: 14844314151     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030083.1030116     Document Type: Conference Paper
Times cited : (241)

References (38)
  • 1
    • 14844325618 scopus 로고    scopus 로고
    • July
    • http://www.swiveltechnologies.com, July 2004.
    • (2004)
  • 2
    • 14844282631 scopus 로고    scopus 로고
    • July
    • http://www.hirschelectronics.com/Products_ScramblePads.asp, July 2004.
    • (2004)
  • 3
    • 14844287484 scopus 로고    scopus 로고
    • Passfaces. Apr.
    • Passfaces. www.realuser.com, Apr. 2004.
    • (2004)
  • 6
    • 14844287840 scopus 로고    scopus 로고
    • Shoulder-surfing automated
    • Apr.
    • BRADER, M. Shoulder-surfing automated. Risks Digest 19.70, Apr. 1998.
    • (1998) Risks Digest 19.70
    • Brader, M.1
  • 8
    • 0002020833 scopus 로고    scopus 로고
    • A quick and dirty usability scale
    • P. Jordan, B. Thomas, B. Weerdmeester, and I. McClelland, Eds. Taylor and Francis, London
    • BROOKE, J. SUS: A quick and dirty usability scale. In Usability evaluation in industry, P. Jordan, B. Thomas, B. Weerdmeester, and I. McClelland, Eds. Taylor and Francis, London, 1996, pp. 189-194.
    • (1996) Usability Evaluation in Industry , pp. 189-194
    • Sus, B.J.1
  • 9
    • 14844292015 scopus 로고    scopus 로고
    • Atm scam netted $620,000 australian
    • Aug.
    • COLVILLE, J. Atm scam netted $620,000 australian. Risks Digest 22.85, Aug. 2003.
    • (2003) Risks Digest 22.85
    • Colville, J.1
  • 10
    • 14844315858 scopus 로고
    • Card-o-rama: Magnetic stripe technology and beyond
    • COUNT ZERO. Card-o-rama: Magnetic stripe technology and beyond. Phrack, 37 (1992).
    • (1992) Phrack , vol.37
    • Zero, C.1
  • 11
    • 85084161493 scopus 로고    scopus 로고
    • Déjà vu: A user study using images for authentication
    • Denver, CO, USA, Aug.
    • DHAMIJA, R., AND PERRIG, A. Déjà vu: A user study using images for authentication. In Proc. 9th USENIX Security Symposium (Denver, CO, USA, Aug. 2000).
    • (2000) Proc. 9th USENIX Security Symposium
    • Dhamija, R.1    Perrig, A.2
  • 12
    • 0242696305 scopus 로고    scopus 로고
    • An approach to usable security based on event monitoring and visualization
    • Virginia Beach, VA, USA, Sept., ACM
    • DOURISH, P., AND REDMILES, D. An approach to usable security based on event monitoring and visualization. In Proc. New Security Paradigms Workshop (Virginia Beach, VA, USA, Sept. 2002), ACM, pp. 75-81.
    • (2002) Proc. New Security Paradigms Workshop , pp. 75-81
    • Dourish, P.1    Redmiles, D.2
  • 13
    • 14844324416 scopus 로고    scopus 로고
    • A secure human-computer authentication scheme
    • School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, May
    • HOPPER, N. J., AND BLUM, M. A secure human-computer authentication scheme. Technical Report CMU-CS-00-139, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, May 2000.
    • (2000) Technical Report , vol.CMU-CS-00-139
    • Hopper, N.J.1    Blum, M.2
  • 14
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • ASIACRYPT (2001), C. Boyd, Ed., Springer Verlag
    • HOPPER, N. J., AND BLUM, M. Secure human identification protocols. In ASIACRYPT (2001), C. Boyd, Ed., vol. 2249 of Lecture Notes in Computer Science, Springer Verlag, pp. 52-66.
    • Lecture Notes in Computer Science , vol.2249 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 17
    • 0042044284 scopus 로고    scopus 로고
    • Practical human-machine identification over insecure channels
    • LI, X.-Y., AND TENG, S.-H. Practical human-machine identification over insecure channels. Journal of Combinatorial Optimization 3, 4 (1999).
    • (1999) Journal of Combinatorial Optimization , vol.3 , pp. 4
    • Li, X.-Y.1    Teng, S.-H.2
  • 18
    • 84995399871 scopus 로고    scopus 로고
    • Human identification through insecure channel
    • EUROCRYPT (1991), D. W. Davies, Ed., Springer Verlag
    • MATSUMOTO, T., AND IMAI, H. Human identification through insecure channel. In EUROCRYPT (1991), D. W. Davies, Ed., vol. 547 of Lecture Notes in Computer Science, Springer Verlag, pp. 409-421.
    • Lecture Notes in Computer Science , vol.547 , pp. 409-421
    • Matsumoto, T.1    Imai, H.2
  • 19
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • MILLER, G. A. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review 63 (1956), 81-97.
    • (1956) Psychological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 20
  • 26
    • 0038226921 scopus 로고    scopus 로고
    • Moving from the design of usable security technologies to the design of useful secure applications
    • Virginia Beach, VA, USA, Sept., ACM
    • SMETTERS, D. K., AND GRINTER, R. E. Moving from the design of usable security technologies to the design of useful secure applications. In Proceedings of the New Security Paradigms Workshop (Virginia Beach, VA, USA, Sept. 2002), ACM, pp. 82-89.
    • (2002) Proceedings of the New Security Paradigms Workshop , pp. 82-89
    • Smetters, D.K.1    Grinter, R.E.2
  • 27
    • 0039068594 scopus 로고
    • Authenticating users by word association
    • SMITH, S. L. Authenticating users by word association. Computers & Security 6 (1987), 464-470.
    • (1987) Computers & Security , vol.6 , pp. 464-470
    • Smith, S.L.1
  • 28
    • 0028406329 scopus 로고
    • Pass-sentence - A new approach to computer code
    • SPECTOR, Y., AND GINZBERG, J. Pass-sentence - a new approach to computer code. Computers & Security 13 (1994), 145-160.
    • (1994) Computers & Security , vol.13 , pp. 145-160
    • Spector, Y.1    Ginzberg, J.2
  • 30
  • 31
    • 14844310900 scopus 로고    scopus 로고
    • User-centered security engineering
    • Helsinki, Finland, Feb.
    • TOM MARKOTTEN, D. G. User-centered security engineering. In Proc. 4th NordU Conference (Helsinki, Finland, Feb. 2002).
    • (2002) Proc. 4th NordU Conference
    • Tom Markotten, D.G.1
  • 32
    • 1942455789 scopus 로고    scopus 로고
    • Neural activity predicts individual differences in visual working memory capacity
    • Apr.
    • VOGEL, E. K., AND MACHIZAWA, M. G. Neural activity predicts individual differences in visual working memory capacity. Nature 428 (Apr. 2004), 748-751.
    • (2004) Nature , vol.428 , pp. 748-751
    • Vogel, E.K.1    Machizawa, M.G.2
  • 34
    • 85084161247 scopus 로고    scopus 로고
    • Why johnny can't encrypt: A usability evaluation of PGP 5.0
    • August
    • WHITTEN, A., AND TYGAR, J. D. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proc. 9th USENIX Security Symposium (August 1999).
    • (1999) Proc. 9th USENIX Security Symposium
    • Whitten, A.1    Tygar, J.D.2
  • 35
    • 14844281996 scopus 로고    scopus 로고
    • Method and apparatus for secure PIN entry. US Patent #5,940,511, United States Patent and Trademark Office, May. Assignee: Lucent Technologies, Inc. (Murray Hill, NJ)
    • WILFONG, G. T. Method and apparatus for secure PIN entry. US Patent #5,940,511, United States Patent and Trademark Office, May 1997. Assignee: Lucent Technologies, Inc. (Murray Hill, NJ).
    • (1997)
    • Wilfong, G.T.1
  • 36
    • 14844289174 scopus 로고    scopus 로고
    • Spain uncovers hi-tech cashpoint fraud
    • Jan.
    • WOOD, D. Spain uncovers hi-tech cashpoint fraud. BBC News Online, Jan. 2003.
    • (2003) BBC News Online
    • Wood, D.1
  • 37
    • 84944056366 scopus 로고    scopus 로고
    • User interaction design for secure systems
    • Proc. 4th International Conference on Information and Communications Security Singapore, Dec., R. Deng, S. Qing, F. Bao, and J. Zhou, Eds., Springer Verlag. ISBN 3-540-00164-6
    • YEE, K.-P. User interaction design for secure systems. In Proc. 4th International Conference on Information and Communications Security (Singapore, Dec. 2002), R. Deng, S. Qing, F. Bao, and J. Zhou, Eds., vol. 2513 of Lecture Notes in Computer Science, Springer Verlag, pp. 278-290. ISBN 3-540-00164-6.
    • (2002) Lecture Notes in Computer Science , vol.2513 , pp. 278-290
    • Yee, K.-P.1
  • 38
    • 0025545602 scopus 로고
    • Cognitive passwords: The key to easy access control
    • ZVIRAN, M., AND HAGA, W. J. Cognitive passwords: The key to easy access control. Computers & Security 9 (1990), 723-736.
    • (1990) Computers & Security , vol.9 , pp. 723-736
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.