메뉴 건너뛰기




Volumn , Issue , 2004, Pages 50-60

Towards secure design choices for implementing graphical passwords

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; BRUTE-FORCE GUESSING ATTACKS; DRAW-A-SECRET (DAS); PASSWORDS;

EID: 21644474142     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2004.44     Document Type: Conference Paper
Times cited : (78)

References (29)
  • 2
    • 7544230652 scopus 로고    scopus 로고
    • Robust discretization, with an application to graphical passwords
    • site accessed Jan. 12, 2004
    • J.-C. Birget, D. Hong, and N. Memon. Robust Discretization, With an Application to Graphical Passwords. Cryptology ePrint Archive, Report 2003/168, 2003. http://eprint.iacr.org/, site accessed Jan. 12, 2004.
    • (2003) Cryptology EPrint Archive, Report , vol.2003 , Issue.168
    • Birget, J.-C.1    Hong, D.2    Memon, N.3
  • 5
    • 0347455573 scopus 로고
    • Identification of dot patterns from memory as a function of complexity
    • R.-S. French. Identification of Dot Patterns From Memory as a Function of Complexity. Journal of Experimental Psychology, 47:22-26, 1954.
    • (1954) Journal of Experimental Psychology , vol.47 , pp. 22-26
    • French, R.-S.1
  • 7
    • 0347150493 scopus 로고
    • Measurement of visual memory span by means of the recall of dot-in-matrix patterns
    • S.-I. Ichikawa. Measurement of Visual Memory Span by Means of the Recall of Dot-in-Matrix Patterns. Behavior Research Methods and Instrumentation, 14(3):309-313, 1982.
    • (1982) Behavior Research Methods and Instrumentation , vol.14 , Issue.3 , pp. 309-313
    • Ichikawa, S.-I.1
  • 10
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • D. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. In The 2nd USENIX Security Workshop, pages 5-14, 1990.
    • (1990) 2nd USENIX Security Workshop , pp. 5-14
    • Klein, D.1
  • 11
    • 84955153370 scopus 로고
    • Picture memory
    • J. C. Yuille, editor, Lawrence Erlbaum Associates Inc., N.J., U.S.A.
    • S. Madigan. Picture Memory. In J. C. Yuille, editor, Imagery, Memory and Cognition, pages 65-89. Lawrence Erlbaum Associates Inc., N.J., U.S.A., 1983.
    • (1983) Imagery, Memory and Cognition , pp. 65-89
    • Madigan, S.1
  • 14
    • 84860956996 scopus 로고    scopus 로고
    • site accessed May 14, 2004
    • Microsoft. Microsoft XP Tablet PC Edition. http://www. microsoft.com/windowsxp/tabletpc, site accessed May 14, 2004.
    • Microsoft XP Tablet PC Edition
  • 16
    • 21644466970 scopus 로고    scopus 로고
    • site accessed Jan. 12, 2004
    • A. Muffett. Crack password cracker, http://ciac.llnl.gov/ciac/ToolsUnixAuth.html, site accessed Jan. 12, 2004.
    • Crack Password Cracker
    • Muffett, A.1
  • 17
    • 21644455927 scopus 로고    scopus 로고
    • Analyzing user choice in graphical passwords
    • School of Computer Science, Carleton University, Canada
    • D. Nali and J. Thorpe. Analyzing User Choice in Graphical Passwords. Tech. Report TR-04-01, School of Computer Science, Carleton University, Canada, 2004.
    • (2004) Tech. Report , vol.TR-04-01
    • Nali, D.1    Thorpe, J.2
  • 18
    • 84872105856 scopus 로고    scopus 로고
    • site accessed Jan.7, 2004
    • Openwall Project. John the Ripper password cracker, http://www.openwall.com/john/, site accessed Jan.7, 2004.
    • John the Ripper Password Cracker
  • 19
    • 84860972040 scopus 로고    scopus 로고
    • site accessed Jan.7 2004
    • Openwall Project. Wordlists. http://www.openwall.com/passwords/wordlists/, site accessed Jan.7 2004.
    • Wordlists
  • 22
    • 33745709832 scopus 로고    scopus 로고
    • site accessed May 24, 2004
    • Real User Corporation. About Passfaces. http://www.realuser.com, site accessed May 24, 2004.
    • About Passfaces
  • 23
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. Shannon. A Mathematical Theory of Communication. The Bell System Technical Journal, 27:379-423, 1948.
    • (1948) The Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.1
  • 24
    • 0024681099 scopus 로고
    • Crisis and aftermath (the Internet worm)
    • E. Spafford. Crisis and Aftermath (The Internet Worm). Comm. of the ACM, 32(6):678-687, 1989.
    • (1989) Comm. of the ACM , vol.32 , Issue.6 , pp. 678-687
    • Spafford, E.1
  • 25
    • 21644450856 scopus 로고    scopus 로고
    • Addressing online dictionary attacks with login histories and humans-in-the-loop
    • Springer-Verlag LNCS (to appear)
    • S. Stubblebine and P. van Oorschot. Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop. In Financial Cryptography'04. Springer-Verlag LNCS (to appear), 2004.
    • (2004) Financial Cryptography'04
    • Stubblebine, S.1    Van Oorschot, P.2
  • 26
    • 85084163855 scopus 로고    scopus 로고
    • Graphical dictionaries and the memorable space of graphical passwords
    • J. Thorpe and P. van Oorschot. Graphical Dictionaries and the Memorable Space of Graphical Passwords. In 13th USENIX Security Symposium, 2004.
    • (2004) 13th USENIX Security Symposium
    • Thorpe, J.1    Van Oorschot, P.2
  • 28
    • 0242708748 scopus 로고    scopus 로고
    • A note on proactive password checking
    • New Mexico, USA, site accessed Jan. 12, 2004
    • J. Yan. A Note on Proactive Password Checking. ACM New Security Paradigms Workshop, New Mexico, USA, 2001. http://citeseer.nj.nec.com/yan01note.html, site accessed Jan. 12, 2004.
    • (2001) ACM New Security Paradigms Workshop
    • Yan, J.1
  • 29
    • 0008915230 scopus 로고    scopus 로고
    • The memorability and security of passwords - Some empirical results
    • Computer Laboratory,University of Cambridge, site accessed September 6, 2004
    • J. Yan, A. Blackwell, R. Anderson, and A. Grant. The Memorability and Security of Passwords - Some Empirical Results. Technical Report No. 500,Computer Laboratory,University of Cambridge, 2000. http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf, site accessed September 6, 2004.
    • (2000) Technical Report No. 500 , vol.500
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.