-
1
-
-
9944261689
-
-
Taylor & Francis, London
-
A. D. Angeli, L. Coventry, G. I. Johnson and M. Coutts., Usability and user authentication: Pictorial passwords vs. PIN., Contemporary Ergonomics, pages 253-258., Taylor & Francis, London, 2003.
-
(2003)
Usability and user authentication: Pictorial passwords vs. PIN., Contemporary Ergonomics, pages 253-258
-
-
Angeli, A.D.1
Coventry, L.2
Johnson, G.I.3
Coutts, M.4
-
2
-
-
34548112839
-
-
Honolulu, HI, June
-
E. Bekkering, M. Warkentin and K. Davis, A Longitudinal Comparison of Four Password Procedures, Proceedings of the 2003 Hawaii International Conference on Business, Honolulu, HI, June 2003.
-
(2003)
A Longitudinal Comparison of Four Password Procedures, Proceedings of the 2003 Hawaii International Conference on Business
-
-
Bekkering, E.1
Warkentin, M.2
Davis, K.3
-
3
-
-
47849105957
-
-
Available at:, Retrieved October 24, 2005
-
BioPassword, Biopassword, Available at: http://www.biopassword. com/bp2/welcome.asp, Retrieved October 24, 2005.
-
Biopassword
-
-
BioPassword1
-
4
-
-
7544230652
-
-
Available at:, Retrieved November 4, 2005
-
J.-C. Birget, D. Hong and N. Memon, Robust Discretization, with an Application to Graphical Passwords, Available at: citeseer.ist.psu.edu/ birget03robust.html, Retrieved November 4, 2005.
-
Robust Discretization, with an Application to Graphical Passwords
-
-
Birget, J.-C.1
Hong, D.2
Memon, N.3
-
7
-
-
33745723917
-
-
PhD Dissertation, Department of Computer Science University College London, September 30
-
A. Brostoff, Improving Password System Effectivness, PhD Dissertation, Department of Computer Science University College London, September 30, 2004.
-
(2004)
Improving Password System Effectivness
-
-
Brostoff, A.1
-
8
-
-
34548114515
-
-
S. Brostoff and M. A. Sasse, Are Passfaces More Usable Than Passwords? A Field Trial Investigation, Proceedings of CHI 2000, People and Computers XIV, pp. 405 - 424, Springer, September 2000.
-
S. Brostoff and M. A. Sasse, Are Passfaces More Usable Than Passwords? A Field Trial Investigation, Proceedings of CHI 2000, People and Computers XIV, pp. 405 - 424, Springer, September 2000.
-
-
-
-
9
-
-
34548109618
-
-
R. U. Corporation, The Science Behind Passfaces, Real User, Available at: http://www.realuser.com/, June 2004.
-
R. U. Corporation, The Science Behind Passfaces, Real User, Available at: http://www.realuser.com/, June 2004.
-
-
-
-
10
-
-
85084162383
-
-
San Diego, August
-
D. Davis, F. Monrose and M. K. Reiter, On user choice in Graphical Password Schemes, In Proceedings of the 13th USENIX Security Symposium, San Diego, August 2004.
-
(2004)
On user choice in Graphical Password Schemes, In Proceedings of the 13th USENIX Security Symposium
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
11
-
-
85084161493
-
-
Denver, Colorado, August
-
R. Dhamija and A. Perrig, Deja Vu: A User Study. Using Images for Authentication, Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, August 2000.
-
(2000)
Deja Vu: A User Study. Using Images for Authentication, Proceedings of the 9th USENIX Security Symposium
-
-
Dhamija, R.1
Perrig, A.2
-
13
-
-
34548112838
-
-
N. I. G. T. Force., Player id age verification and border control technology forum., Available at: http://www.nevadaigtf.org/TechnologyForum. html., Retrieved October 23, 2005.
-
N. I. G. T. Force., Player id age verification and border control technology forum., Available at: http://www.nevadaigtf.org/TechnologyForum. html., Retrieved October 23, 2005.
-
-
-
-
15
-
-
26844503950
-
-
Available at:, Retrieved October 24, 2005
-
W. Jansen, S. Gavrila, V. Korolev, R. Ayers and R. Swanstrom, Picture Password: A Visual Login Technique for Mobile Devices, Available at: http://csrc.nist.gov/publications/nistir/nistir-7030.pdf, Retrieved October 24, 2005.
-
Picture Password: A Visual Login Technique for Mobile Devices
-
-
Jansen, W.1
Gavrila, S.2
Korolev, V.3
Ayers, R.4
Swanstrom, R.5
-
16
-
-
85084161999
-
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter and A. D. Rubin, The Design and Analysis of Graphical Passwords, Proceedings of the 8th USENIX Security Symposium, Washington, D.C., August 23-36, 1999.
-
(1999)
The Design and Analysis of Graphical Passwords, Proceedings of the 8th USENIX Security Symposium, Washington, D.C., August 23-36
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
19
-
-
34548109614
-
-
Designing for Society, Bath, England, 8-12 Sept
-
J. Liddell, K. Renaud and A. D. Angeli, Using a Combination of Sound and Images to Authenticate Web Users, 17th Annual Human Computer Interaction Conference. Designing for Society, Bath, England, 8-12 Sept, 2003.
-
(2003)
Using a Combination of Sound and Images to Authenticate Web Users, 17th Annual Human Computer Interaction Conference
-
-
Liddell, J.1
Renaud, K.2
Angeli, A.D.3
-
20
-
-
85084164397
-
-
Sal Lake City, Utah, June
-
D. L. McDonald, R. J. Atkinson and C. Metz, One Time Passwords In Everything (OPIE): Experiences with Building and Using Stronger Authentication, Proceedings of teh Fifth USENIX UNIX Security Symposium, Sal Lake City, Utah, June 1995.
-
(1995)
One Time Passwords In Everything (OPIE): Experiences with Building and Using Stronger Authentication, Proceedings of teh Fifth USENIX UNIX Security Symposium
-
-
McDonald, D.L.1
Atkinson, R.J.2
Metz, C.3
-
21
-
-
0038628620
-
-
F. Monrose, M. K. Reiter and S. Wetzel, Password Hardening based on Keystroke Dynamics, International Journal of Information Security, 1(1):69-83, 2001.
-
(2001)
Password Hardening based on Keystroke Dynamics, International Journal of Information Security
, vol.1
, Issue.1
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
23
-
-
21644455927
-
Analyzing User Choice in Graphical Passwords
-
Tech. Report TR-04-01, School of Computer Science Carleton University, Canada
-
D. Nali and J. Thorpe., Analyzing User Choice in Graphical Passwords., Tech. Report TR-04-01, School of Computer Science Carleton University, Canada, 2004.
-
(2004)
-
-
Nali, D.1
Thorpe, J.2
-
24
-
-
34548117580
-
-
Edith Cowan University, Australia
-
J. Pierce, J. Wells, M. Warren and D. Mackay, Conceptual Model for Graphical Authentication, 1st Australian Information Security Management Conference, Edith Cowan University, Australia, 2003.
-
(2003)
Conceptual Model for Graphical Authentication, 1st Australian Information Security Management Conference
-
-
Pierce, J.1
Wells, J.2
Warren, M.3
Mackay, D.4
-
25
-
-
34548115890
-
-
Available at:, November
-
Pointsec, PicturePINs, Available at: http://www.pointsec.com/news/ download/Pointsec_PPC_2.0_POP_PA1.pdf, November 2002.
-
(2002)
PicturePINs
-
-
Pointsec1
-
27
-
-
34548112826
-
-
Monterey, California, USA, June 6-11
-
N. Provos and D. Mazieres, A Future-Adaptable Password Scheme, USENIX Annual Technical Conference, Monterey, California, USA, June 6-11, 1999.
-
(1999)
A Future-Adaptable Password Scheme, USENIX Annual Technical Conference
-
-
Provos, N.1
Mazieres, D.2
-
28
-
-
34548109612
-
Quantifying the Quality of Web Authentication Mechanisms
-
Rinton Press, Available at
-
K. Renaud, Quantifying the Quality of Web Authentication Mechanisms. A Usability Perspective, Journal of Web Engineering, Vol. 0, No. 0, Rinton Press, Available at: http://www.dcs.gla.ac.uk/~karen/Papers/j.pdf, 2003.
-
(2003)
A Usability Perspective, Journal of Web Engineering
, vol.0
, Issue.0
-
-
Renaud, K.1
-
29
-
-
34548111307
-
-
Pretoria, South Africa, 25-28 September
-
K. Renaud and E. Smith, Jiminy: Helping Users to Remember Their Passwords, Annual Conference of the South African Institute of Computer Scientists and Information Technologists, Pretoria, South Africa, 25-28 September 2001.
-
(2001)
Jiminy: Helping Users to Remember Their Passwords, Annual Conference of the South African Institute of Computer Scientists and Information Technologists
-
-
Renaud, K.1
Smith, E.2
-
30
-
-
34548109608
-
-
Available at:, Retrieved November 4
-
S. Ross, Is It Just My Imagination? Available at: http://research.microsoft.com/displayArticle.aspx?id=417, Retrieved November 4, 2005.
-
(2005)
It Just My Imagination
-
-
Ross, S.1
Is2
-
32
-
-
7544243600
-
-
Available at:, Retrieved November 3, 2005
-
L. Sobrado and J.-C. Birget, Graphical passwords, Available at: http://rutgersscholar.rutgers.edu/volume04/sobrbirg/sobrbirg.htm, Retrieved November 3, 2005.
-
Graphical passwords
-
-
Sobrado, L.1
Birget, J.-C.2
-
33
-
-
0013197874
-
-
Available at:, Retrieved November 3, 2005
-
E. Spafford, Observing Reusable Password Choices, Available at: citeseer.ist.psu.edu/spafford92observing.html, Retrieved November 3, 2005.
-
Observing Reusable Password Choices
-
-
Spafford, E.1
-
34
-
-
50249084082
-
-
Available at:, Retrieved October 23, 2005
-
J. Thorpe, P. C. v. Oorschot and A. Somayaji, Pass-thoughts: Authenticating with Our Minds, Available at: citeseer.ist.psu.edu/ thorpe05passthoughts.html, Retrieved October 23, 2005.
-
Pass-thoughts: Authenticating with Our Minds
-
-
Thorpe, J.1
Oorschot, P.C.V.2
Somayaji, A.3
-
36
-
-
21644474142
-
-
Tucson, Arizona, December 6-10
-
J. Thorpe and P. v. Oorschot, Towards Secure Design Choices For Implementing Graphical Passwords, 20th Annual Computer Security Applications Conference, Tucson, Arizona, December 6-10, 2004.
-
(2004)
Towards Secure Design Choices For Implementing Graphical Passwords, 20th Annual Computer Security Applications Conference
-
-
Thorpe, J.1
Oorschot, P.V.2
-
39
-
-
51849165620
-
-
Available at:, Retrieved October 23, 2005
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy and N. Memon, Authentication Using Graphical Passwords: Basic Results, Available at: http://clam.rutgers.edu/~birget/grPssw/susan3.pdf, Retrieved October 23, 2005.
-
Authentication Using Graphical Passwords: Basic Results
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
40
-
-
60649116908
-
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy and N. Memon, Authentication using graphical passwords: effects of tolerance and image choice, ACM International Conference Proceeding Series; 93, Proceedings of the 2005 symposium on Usable privacy and security, Pittsburgh, Pennsylvania, 2005.
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy and N. Memon, Authentication using graphical passwords: effects of tolerance and image choice, ACM International Conference Proceeding Series; Vol. 93, Proceedings of the 2005 symposium on Usable privacy and security, Pittsburgh, Pennsylvania, 2005.
-
-
-
-
41
-
-
19944381937
-
PassPoints: Design and Longitudinal Evaluation of a Graphical Password System, International Journal of Human-Computer Studies
-
Elsevier Science, July
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy and N. Memon, PassPoints: Design and Longitudinal Evaluation of a Graphical Password System, International Journal of Human-Computer Studies, Volume 63, Issues 1-2, Elsevier Science, July 2005.
-
(2005)
Issues 1-2
, vol.63
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
42
-
-
46149088475
-
-
Lexington, Kentucky, October 17-19
-
R. V. Yampolskiy, Analyzing User Password Selection Behavior for Reduction of Password Space, The IEEE International Carnahan Conference on Security Technology (ICCST06), Lexington, Kentucky, October 17-19, 2006.
-
(2006)
Analyzing User Password Selection Behavior for Reduction of Password Space, The IEEE International Carnahan Conference on Security Technology (ICCST06)
-
-
Yampolskiy, R.V.1
|