-
1
-
-
33846309831
-
HCI and Security Systems
-
presented at, Ft. Lauderdale, Florida, USA
-
A. S. Patrick, A. C. Long, and S. Flinn, "HCI and Security Systems," presented at CHI, Extended Abstracts (Workshops). Ft. Lauderdale, Florida, USA., 2003.
-
(2003)
CHI, Extended Abstracts (Workshops)
-
-
Patrick, A.S.1
Long, A.C.2
Flinn, S.3
-
2
-
-
0043232732
-
Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
-
A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.
-
(1999)
Communications of the ACM
, vol.42
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
50249139386
-
Biometrics: Getting Back to Business
-
K. Gilhooly, "Biometrics: Getting Back to Business," in Computerworld, May 09, 2005.
-
(2005)
Computerworld, May 09
-
-
Gilhooly, K.1
-
5
-
-
33846283244
-
Microsoft: Write down your passwords
-
M. Kotadia, "Microsoft: Write down your passwords," in ZDNet Australia, May 23, 2005.
-
(2005)
ZDNet Australia, May 23
-
-
Kotadia, M.1
-
6
-
-
33846306154
-
Phishing attacks take a new twist
-
A. Gilbert, "Phishing attacks take a new twist," in CNET News.com, May 04, 2005.
-
(2005)
CNET News.com, May 04
-
-
Gilbert, A.1
-
7
-
-
33846304841
-
Biometrie identification
-
A. Jain, L. Hong, and S. Pankanti, "Biometrie identification," Communications of the ACM, vol. 33, pp. 168-176, 2000.
-
(2000)
Communications of the ACM
, vol.33
, pp. 168-176
-
-
Jain, A.1
Hong, L.2
Pankanti, S.3
-
8
-
-
49949146625
-
Recognition memory for words, sentences, and pictures
-
R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol. 6, pp. 156-163, 1967.
-
(1967)
Journal of Verbal Learning and Verbal Behavior
, vol.6
, pp. 156-163
-
-
Shepard, R.N.1
-
10
-
-
33846293449
-
-
S. Akula and V. Devisetty, Image Based Registration and Authentication System, m Proceedings of Mid-west Instruction and Computing Symposium, 2004.
-
S. Akula and V. Devisetty, "Image Based Registration and Authentication System," m Proceedings of Mid-west Instruction and Computing Symposium, 2004.
-
-
-
-
11
-
-
19944375977
-
Passwords You'll Never Forget, but Can't Recall
-
Vienna, Austria: ACM
-
D. Weinshall and S. Kirkpatrick, "Passwords You'll Never Forget, but Can't Recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI). Vienna, Austria: ACM, 2004, pp. 1399-1402.
-
(2004)
Proceedings of Conference on Human Factors in Computing Systems (CHI)
, pp. 1399-1402
-
-
Weinshall, D.1
Kirkpatrick, S.2
-
13
-
-
12244303262
-
A password scheme strongly resistant to spyware
-
Las Vergas, NV
-
D. Hong, S. Man, B. Hawes, and M. Mathews, "A password scheme strongly resistant to spyware," in Proceedings of International conference on security and management. Las Vergas, NV, 2004.
-
(2004)
Proceedings of International conference on security and management
-
-
Hong, D.1
Man, S.2
Hawes, B.3
Mathews, M.4
-
14
-
-
1642360831
-
A shoulder-surfing resistant graphical password scheme
-
Las Vegas, NV
-
S. Man, D. Hong, and M. Mathews, "A shoulder-surfing resistant graphical password scheme," in Proceedings of International conference on security and management. Las Vegas, NV, 2003.
-
(2003)
Proceedings of International conference on security and management
-
-
Man, S.1
Hong, D.2
Mathews, M.3
-
15
-
-
33846303721
-
-
last accessed in June
-
RealUser, "www.realuser.com." last accessed in June 2005.
-
(2005)
-
-
RealUser1
-
16
-
-
0003306197
-
An evaluation of the Passface personal authentication system
-
Technical Report, Goldsmiths College, University of London
-
T. Valentine, "An evaluation of the Passface personal authentication system," Technical Report, Goldsmiths College, University of London 1998.
-
(1998)
-
-
Valentine, T.1
-
17
-
-
0003308390
-
Memory for Passfaces after a Long Delay
-
Technical Report, Goldsmiths College, University of London
-
T. Valentine, "Memory for Passfaces after a Long Delay," Technical Report, Goldsmiths College, University of London 1999.
-
(1999)
-
-
Valentine, T.1
-
19
-
-
85084162383
-
On user choice in graphical password schemes
-
San Diego, CA
-
D. Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password schemes," in. Proceedings of the 13th Usenix Security Symposium. San Diego, CA, 2004.
-
(2004)
Proceedings of the 13th Usenix Security Symposium
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
20
-
-
33846299042
-
Authenticating Mobile Device Users Through Image Selection
-
W. Jansen, "Authenticating Mobile Device Users Through Image Selection," in Data Security, 2004.
-
(2004)
Data Security
-
-
Jansen, W.1
-
21
-
-
26844503950
-
Picture Password: A Visual Login Technique for Mobile Devices
-
NISTIR 7030, 2003
-
W. Jansen, S. Gavrila, V. Korolev, R. Ayers, and R. Swanstrom, "Picture Password: A Visual Login Technique for Mobile Devices," National Institute of Standards and Technology Interagency Report NISTIR 7030, 2003.
-
National Institute of Standards and Technology Interagency Report
-
-
Jansen, W.1
Gavrila, S.2
Korolev, V.3
Ayers, R.4
Swanstrom, R.5
-
23
-
-
35248815442
-
Awase-E: Image-based Authentication for Mobile Phones using User's Favorite Images
-
Springer-Verlag GmbH, pp. pp
-
T. Takada and H. Koike, "Awase-E: Image-based Authentication for Mobile Phones using User's Favorite Images," in Human-Computer Interaction with Mobile Devices and Services, vol. 2795 / 2003: Springer-Verlag GmbH, 2003, pp. pp. 347 - 351.
-
(2003)
Human-Computer Interaction with Mobile Devices and Services
, vol.2795
-
-
Takada, T.1
Koike, H.2
-
24
-
-
85084161999
-
The Design and Analysis of Graphical Passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
|