메뉴 건너뛰기




Volumn 149, Issue , 2006, Pages 56-66

A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords

Author keywords

Authentication; Graphical passwords; Human factors; Password security; Shoulder surfing; Social engineering; Usable security

Indexed keywords

GRAPHICAL PASSWORDS; HUMAN FACTORS; PASSWORD SECURITY; SHOULDER SURFING; SOCIAL ENGINEERING; USABLE SECURITY;

EID: 34250782167     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1143120.1143128     Document Type: Conference Paper
Times cited : (180)

References (27)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the Enemy: Why Users Compromise Computer Security Mechanisms and how to Take Remedial Measures
    • A. Adams and M. A. Sasse, "Users are not the Enemy: Why Users Compromise Computer Security Mechanisms and how to Take Remedial Measures," Communications of the ACM, vol. 42, pp. 41-46, 1999.
    • (1999) Communications of the ACM , vol.42 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 0015279821 scopus 로고
    • Is Your Computer Insecure?
    • C. T. Beardsley, "Is Your Computer Insecure?," IEEE Spectrum, vol. 9, pp. 67-78, 1972.
    • (1972) IEEE Spectrum , vol.9 , pp. 67-78
    • Beardsley, C.T.1
  • 6
    • 0029304865 scopus 로고
    • Human and Machine Recognition of Faces: A Survey
    • R. Chellappa, C. L. Wilson, and S. Sirohey, "Human and Machine Recognition of Faces: A Survey," Proceedings of the IEEE, vol. 83, pp. 705-741, 1995.
    • (1995) Proceedings of the IEEE , vol.83 , pp. 705-741
    • Chellappa, R.1    Wilson, C.L.2    Sirohey, S.3
  • 9
    • 85084162383 scopus 로고    scopus 로고
    • On User Choice in Graphical Password Schemes
    • presented at, San Diego, CA
    • D. Davis, F. Monrose, and M. Reiter, "On User Choice in Graphical Password Schemes," presented at 13th Usenix Security Symposium, San Diego, CA, 2004.
    • (2004) 13th Usenix Security Symposium
    • Davis, D.1    Monrose, F.2    Reiter, M.3
  • 11
    • 34250752674 scopus 로고
    • Department of Defense Password Management Guideline
    • Department of Defense Computer Security Center, April 12
    • Department of Defense Computer Security Center, "Department of Defense Password Management Guideline," Department of Defense, Washington, DC CSC-STD-002-85, April 12 1985.
    • (1985) Department of Defense, Washington, DC CSC-STD-002-85
  • 12
    • 85084161493 scopus 로고    scopus 로고
    • Deja Vu: A User Study. Using Images for Authentication
    • presented at
    • R. Dhamija and A. Perrig, "Deja Vu: A User Study. Using Images for Authentication," presented at 9th USENDC Security Symposium, 2000.
    • (2000) 9th USENDC Security Symposium
    • Dhamija, R.1    Perrig, A.2
  • 15
    • 84897771350 scopus 로고    scopus 로고
    • Social Engineering Fundamentals, Part I: Hacker Tactics
    • S. Granger, "Social Engineering Fundamentals, Part I: Hacker Tactics," vol. 2006: SecurityFocus, 2001.
    • (2001) SecurityFocus , vol.2006
    • Granger, S.1
  • 18
    • 34250707178 scopus 로고    scopus 로고
    • Using a Combination of Sound and Images to Authenticate Web Users
    • presented at Designing for Society, Bath England
    • J. Liddell, K. Renaud, and A. De Angeli, "Using a Combination of Sound and Images to Authenticate Web Users," presented at 17th Annual Human Computer Interaction Conference: Designing for Society, Bath England, 2003.
    • (2003) 17th Annual Human Computer Interaction Conference
    • Liddell, J.1    Renaud, K.2    De Angeli, A.3
  • 21
    • 39749093168 scopus 로고
    • The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information
    • G. A. Miller, "The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information," The Psychological Review, vol. 63, pp. 81-97, 1956.
    • (1956) The Psychological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 24
    • 34250729630 scopus 로고    scopus 로고
    • Hacking human: Data-archaeology and surveillance in social networks
    • J. Nolan and M. Levesque, "Hacking human: data-archaeology and surveillance in social networks," ACM SIGGROUP Bulliten, vol. 25, pp. 33-37.
    • ACM SIGGROUP Bulliten , vol.25 , pp. 33-37
    • Nolan, J.1    Levesque, M.2
  • 25
    • 10044293457 scopus 로고    scopus 로고
    • Comparing Passwords, Tokens, and Biometrics for User Authentication
    • L. O'Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication," Proceedings of the IEEE, vol. 91, pp. 2021-2039, 2003.
    • (2003) Proceedings of the IEEE , vol.91 , pp. 2021-2039
    • O'Gorman, L.1
  • 26
    • 23944463649 scopus 로고    scopus 로고
    • The Urgency for Effective User Privacy Education to Counter Social Engineering Attacks on Secure Computer Systems
    • presented at, Salt Lake City, Utah
    • G. Orgill, G. W. Romney, and P. M. Orgill, "The Urgency for Effective User Privacy Education to Counter Social Engineering Attacks on Secure Computer Systems," presented at 5th Coneference on Information Technology Education (SIGITE '04), Salt Lake City, Utah, 2004.
    • (2004) 5th Coneference on Information Technology Education (SIGITE '04)
    • Orgill, G.1    Romney, G.W.2    Orgill, P.M.3
  • 27
    • 34250757512 scopus 로고    scopus 로고
    • A. A. Ozok and S. H. Holden, Alphanumeric and Graphical Authentication Solutions: A Comparative
    • A. A. Ozok and S. H. Holden, "Alphanumeric and Graphical Authentication Solutions: A Comparative


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.