메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 177-184

Design and evaluation of a shoulder-surfing resistant graphical password scheme

Author keywords

Authentication; Convex hull click scheme; Graphical passwords; Password security; Shoulder surfing; Usable security

Indexed keywords

AUTHENTICATION; COMPUTER CRIME; GRAPHIC METHODS; SECURITY OF DATA; USER INTERFACES;

EID: 34247167942     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1133265.1133303     Document Type: Conference Paper
Times cited : (296)

References (21)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Adams, A. and Sasse, M.A. Users are not the enemy. CACM 42, 12 (1999), 41-46.
    • (1999) CACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 2
    • 0003429117 scopus 로고    scopus 로고
    • Are Passfaces more usable than passwords: A field trial investigation
    • McDonald S, et al, Eds, Springer
    • Brostoff, S. and Sasse, M.A. Are Passfaces more usable than passwords: A field trial investigation. In McDonald S., et al. (Eds.), People and Computers XIV - Usability or Else, Proc. of HCI2000, Springer, 2000, 405-424.
    • (2000) People and Computers XIV - Usability or Else, Proc. of HCI2000 , pp. 405-424
    • Brostoff, S.1    Sasse, M.A.2
  • 6
    • 19944372131 scopus 로고    scopus 로고
    • Is a picture worth a thousand words? Exploring the feasibility of graphical authentication systems
    • De Angeli, A., Coventry, L., Johnson, G., and Renaud, K. Is a picture worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63, 1-2 (2005), 128-152.
    • (2005) International Journal of Human-Computer Studies , vol.63 , Issue.1-2 , pp. 128-152
    • De Angeli, A.1    Coventry, L.2    Johnson, G.3    Renaud, K.4
  • 8
    • 19944377355 scopus 로고    scopus 로고
    • Hash visualization in user authentication
    • ACM Press, NY
    • Dhamija, R. Hash visualization in user authentication. In Proc. of CHI 2000, ACM Press, NY, 2002, 279-280.
    • (2002) Proc. of CHI 2000 , pp. 279-280
    • Dhamija, R.1
  • 10
    • 0003532271 scopus 로고
    • UNIX password security -ten years later
    • Advances in Cryptography, CRYPTO '89, Springer-Verlag
    • Feldmeier, D. C. and Kam, P. R. UNIX password security -ten years later. In Advances in Cryptography - CRYPTO '89, Lecture Notes in Computer Science 435, Springer-Verlag 1990, 44-63.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 44-63
    • Feldmeier, D.C.1    Kam, P.R.2
  • 11
    • 4243096135 scopus 로고    scopus 로고
    • The domino effect of password reuse
    • Ives, B., Walsh, K. R., and Schneider, H. 2004. The domino effect of password reuse. CACM, 47,4 (2004), 76-78.
    • (2004) CACM , vol.47 , Issue.4 , pp. 76-78
    • Ives, B.1    Walsh, K.R.2    Schneider, H.3
  • 12
    • 85108865018 scopus 로고
    • Intrinsic motivation and instructional effectiveness in computer-based education
    • R. E. Snow and M. J. Farr Eds, Lawrence Erlbaum, Hillsdale, NJ
    • Lepper, M.R. and Malone, T.W. Intrinsic motivation and instructional effectiveness in computer-based education. In R. E. Snow and M. J. Farr (Eds.), Aptitude, Learning, and Instruction, Lawrence Erlbaum, Hillsdale, NJ, 1987, 255-286.
    • (1987) Aptitude, Learning, and Instruction , pp. 255-286
    • Lepper, M.R.1    Malone, T.W.2
  • 13
    • 0018543411 scopus 로고
    • Password security: A case study
    • Morris, R. and Thompson, K. Password security: A case study. CACM, 22, (1979), 594-597.
    • (1979) CACM , vol.22 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 17
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security
    • Sasse, M. A., Brostoff, S. and Weirich, D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technical Journal, 19, (2001), 122-131.
    • (2001) BT Technical Journal , vol.19 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 19
    • 7544243600 scopus 로고    scopus 로고
    • Graphical passwords
    • Sept
    • Sobrado, L. and Birget, J.C. Graphical passwords. The Rutgers Scholar, 4, (Sept. 2002). http://RutgersScholar.rutgers.edu/volume04/sobrbirg/sobrbirg.htm.
    • (2002) The Rutgers Scholar , vol.4
    • Sobrado, L.1    Birget, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.