메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 463-472

Graphical passwords: A survey

Author keywords

[No Author keywords available]

Indexed keywords

GRAPHICAL PASSWORDS; TEXT BASED AUTHENTICATION METHODS; TEXT BASED PASSWORDS;

EID: 33846307457     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.27     Document Type: Conference Paper
Times cited : (349)

References (24)
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
    • A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.
    • (1999) Communications of the ACM , vol.42 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 50249139386 scopus 로고    scopus 로고
    • Biometrics: Getting Back to Business
    • K. Gilhooly, "Biometrics: Getting Back to Business," in Computerworld, May 09, 2005.
    • (2005) Computerworld, May 09
    • Gilhooly, K.1
  • 5
    • 33846283244 scopus 로고    scopus 로고
    • Microsoft: Write down your passwords
    • M. Kotadia, "Microsoft: Write down your passwords," in ZDNet Australia, May 23, 2005.
    • (2005) ZDNet Australia, May 23
    • Kotadia, M.1
  • 6
    • 33846306154 scopus 로고    scopus 로고
    • Phishing attacks take a new twist
    • A. Gilbert, "Phishing attacks take a new twist," in CNET News.com, May 04, 2005.
    • (2005) CNET News.com, May 04
    • Gilbert, A.1
  • 8
    • 49949146625 scopus 로고
    • Recognition memory for words, sentences, and pictures
    • R. N. Shepard, "Recognition memory for words, sentences, and pictures," Journal of Verbal Learning and Verbal Behavior, vol. 6, pp. 156-163, 1967.
    • (1967) Journal of Verbal Learning and Verbal Behavior , vol.6 , pp. 156-163
    • Shepard, R.N.1
  • 10
    • 33846293449 scopus 로고    scopus 로고
    • S. Akula and V. Devisetty, Image Based Registration and Authentication System, m Proceedings of Mid-west Instruction and Computing Symposium, 2004.
    • S. Akula and V. Devisetty, "Image Based Registration and Authentication System," m Proceedings of Mid-west Instruction and Computing Symposium, 2004.
  • 15
    • 33846303721 scopus 로고    scopus 로고
    • last accessed in June
    • RealUser, "www.realuser.com." last accessed in June 2005.
    • (2005)
    • RealUser1
  • 16
    • 0003306197 scopus 로고    scopus 로고
    • An evaluation of the Passface personal authentication system
    • Technical Report, Goldsmiths College, University of London
    • T. Valentine, "An evaluation of the Passface personal authentication system," Technical Report, Goldsmiths College, University of London 1998.
    • (1998)
    • Valentine, T.1
  • 17
    • 0003308390 scopus 로고    scopus 로고
    • Memory for Passfaces after a Long Delay
    • Technical Report, Goldsmiths College, University of London
    • T. Valentine, "Memory for Passfaces after a Long Delay," Technical Report, Goldsmiths College, University of London 1999.
    • (1999)
    • Valentine, T.1
  • 20
    • 33846299042 scopus 로고    scopus 로고
    • Authenticating Mobile Device Users Through Image Selection
    • W. Jansen, "Authenticating Mobile Device Users Through Image Selection," in Data Security, 2004.
    • (2004) Data Security
    • Jansen, W.1
  • 23
    • 35248815442 scopus 로고    scopus 로고
    • Awase-E: Image-based Authentication for Mobile Phones using User's Favorite Images
    • Springer-Verlag GmbH, pp. pp
    • T. Takada and H. Koike, "Awase-E: Image-based Authentication for Mobile Phones using User's Favorite Images," in Human-Computer Interaction with Mobile Devices and Services, vol. 2795 / 2003: Springer-Verlag GmbH, 2003, pp. pp. 347 - 351.
    • (2003) Human-Computer Interaction with Mobile Devices and Services , vol.2795
    • Takada, T.1    Koike, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.