-
2
-
-
7544230652
-
Robust discretization, with an application to graphical passwords
-
site accessed Jan. 12, 2004
-
J.-C. Birget, D. Hong, and N. Memon. Robust Discretization, With an Application to Graphical Passwords. Cryptology ePrint Archive, Report 2003/168, 2003. http://eprint.iacr.org/, site accessed Jan. 12, 2004.
-
(2003)
Cryptology EPrint Archive, Report
, vol.2003
, Issue.168
-
-
Birget, J.-C.1
Hong, D.2
Memon, N.3
-
5
-
-
0347455573
-
Identification of dot patterns from memory as a function of complexity
-
R.-S. French. Identification of Dot Patterns From Memory as a Function of Complexity. Journal of Experimental Psychology, 47:22-26, 1954.
-
(1954)
Journal of Experimental Psychology
, vol.47
, pp. 22-26
-
-
French, R.-S.1
-
7
-
-
0347150493
-
Measurement of visual memory span by means of the recall of dot-in-matrix patterns
-
S.-I. Ichikawa. Measurement of Visual Memory Span by Means of the Recall of Dot-in-Matrix Patterns. Behavior Research Methods and Instrumentation, 14(3):309-313, 1982.
-
(1982)
Behavior Research Methods and Instrumentation
, vol.14
, Issue.3
, pp. 309-313
-
-
Ichikawa, S.-I.1
-
9
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The Design and Analysis of Graphical Passwords. 8th USENIX Security Symposium, 1999.
-
(1999)
8th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
10
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
D. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. In The 2nd USENIX Security Workshop, pages 5-14, 1990.
-
(1990)
2nd USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.1
-
11
-
-
84955153370
-
Picture memory
-
J. C. Yuille, editor, Lawrence Erlbaum Associates Inc., N.J., U.S.A.
-
S. Madigan. Picture Memory. In J. C. Yuille, editor, Imagery, Memory and Cognition, pages 65-89. Lawrence Erlbaum Associates Inc., N.J., U.S.A., 1983.
-
(1983)
Imagery, Memory and Cognition
, pp. 65-89
-
-
Madigan, S.1
-
14
-
-
84860956996
-
-
site accessed May 14, 2004
-
Microsoft. Microsoft XP Tablet PC Edition. http://www. microsoft.com/windowsxp/tabletpc, site accessed May 14, 2004.
-
Microsoft XP Tablet PC Edition
-
-
-
16
-
-
21644466970
-
-
site accessed Jan. 12, 2004
-
A. Muffett. Crack password cracker, http://ciac.llnl.gov/ciac/ToolsUnixAuth.html, site accessed Jan. 12, 2004.
-
Crack Password Cracker
-
-
Muffett, A.1
-
17
-
-
21644455927
-
Analyzing user choice in graphical passwords
-
School of Computer Science, Carleton University, Canada
-
D. Nali and J. Thorpe. Analyzing User Choice in Graphical Passwords. Tech. Report TR-04-01, School of Computer Science, Carleton University, Canada, 2004.
-
(2004)
Tech. Report
, vol.TR-04-01
-
-
Nali, D.1
Thorpe, J.2
-
18
-
-
84872105856
-
-
site accessed Jan.7, 2004
-
Openwall Project. John the Ripper password cracker, http://www.openwall.com/john/, site accessed Jan.7, 2004.
-
John the Ripper Password Cracker
-
-
-
19
-
-
84860972040
-
-
site accessed Jan.7 2004
-
Openwall Project. Wordlists. http://www.openwall.com/passwords/wordlists/, site accessed Jan.7 2004.
-
Wordlists
-
-
-
22
-
-
33745709832
-
-
site accessed May 24, 2004
-
Real User Corporation. About Passfaces. http://www.realuser.com, site accessed May 24, 2004.
-
About Passfaces
-
-
-
23
-
-
84856043672
-
A mathematical theory of communication
-
C. Shannon. A Mathematical Theory of Communication. The Bell System Technical Journal, 27:379-423, 1948.
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.1
-
24
-
-
0024681099
-
Crisis and aftermath (the Internet worm)
-
E. Spafford. Crisis and Aftermath (The Internet Worm). Comm. of the ACM, 32(6):678-687, 1989.
-
(1989)
Comm. of the ACM
, vol.32
, Issue.6
, pp. 678-687
-
-
Spafford, E.1
-
25
-
-
21644450856
-
Addressing online dictionary attacks with login histories and humans-in-the-loop
-
Springer-Verlag LNCS (to appear)
-
S. Stubblebine and P. van Oorschot. Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop. In Financial Cryptography'04. Springer-Verlag LNCS (to appear), 2004.
-
(2004)
Financial Cryptography'04
-
-
Stubblebine, S.1
Van Oorschot, P.2
-
26
-
-
85084163855
-
Graphical dictionaries and the memorable space of graphical passwords
-
J. Thorpe and P. van Oorschot. Graphical Dictionaries and the Memorable Space of Graphical Passwords. In 13th USENIX Security Symposium, 2004.
-
(2004)
13th USENIX Security Symposium
-
-
Thorpe, J.1
Van Oorschot, P.2
-
28
-
-
0242708748
-
A note on proactive password checking
-
New Mexico, USA, site accessed Jan. 12, 2004
-
J. Yan. A Note on Proactive Password Checking. ACM New Security Paradigms Workshop, New Mexico, USA, 2001. http://citeseer.nj.nec.com/yan01note.html, site accessed Jan. 12, 2004.
-
(2001)
ACM New Security Paradigms Workshop
-
-
Yan, J.1
-
29
-
-
0008915230
-
The memorability and security of passwords - Some empirical results
-
Computer Laboratory,University of Cambridge, site accessed September 6, 2004
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. The Memorability and Security of Passwords - Some Empirical Results. Technical Report No. 500,Computer Laboratory,University of Cambridge, 2000. http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf, site accessed September 6, 2004.
-
(2000)
Technical Report No. 500
, vol.500
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|