메뉴 건너뛰기




Volumn , Issue , 2007, Pages 831-836

Secure network authentication with PassText

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; GRAPHIC METHODS; NUMERICAL METHODS;

EID: 34548124975     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2007.174     Document Type: Conference Paper
Times cited : (10)

References (42)
  • 3
    • 47849105957 scopus 로고    scopus 로고
    • Available at:, Retrieved October 24, 2005
    • BioPassword, Biopassword, Available at: http://www.biopassword. com/bp2/welcome.asp, Retrieved October 24, 2005.
    • Biopassword
    • BioPassword1
  • 7
    • 33745723917 scopus 로고    scopus 로고
    • PhD Dissertation, Department of Computer Science University College London, September 30
    • A. Brostoff, Improving Password System Effectivness, PhD Dissertation, Department of Computer Science University College London, September 30, 2004.
    • (2004) Improving Password System Effectivness
    • Brostoff, A.1
  • 8
    • 34548114515 scopus 로고    scopus 로고
    • S. Brostoff and M. A. Sasse, Are Passfaces More Usable Than Passwords? A Field Trial Investigation, Proceedings of CHI 2000, People and Computers XIV, pp. 405 - 424, Springer, September 2000.
    • S. Brostoff and M. A. Sasse, Are Passfaces More Usable Than Passwords? A Field Trial Investigation, Proceedings of CHI 2000, People and Computers XIV, pp. 405 - 424, Springer, September 2000.
  • 9
    • 34548109618 scopus 로고    scopus 로고
    • R. U. Corporation, The Science Behind Passfaces, Real User, Available at: http://www.realuser.com/, June 2004.
    • R. U. Corporation, The Science Behind Passfaces, Real User, Available at: http://www.realuser.com/, June 2004.
  • 13
    • 34548112838 scopus 로고    scopus 로고
    • N. I. G. T. Force., Player id age verification and border control technology forum., Available at: http://www.nevadaigtf.org/TechnologyForum. html., Retrieved October 23, 2005.
    • N. I. G. T. Force., Player id age verification and border control technology forum., Available at: http://www.nevadaigtf.org/TechnologyForum. html., Retrieved October 23, 2005.
  • 23
    • 21644455927 scopus 로고    scopus 로고
    • Analyzing User Choice in Graphical Passwords
    • Tech. Report TR-04-01, School of Computer Science Carleton University, Canada
    • D. Nali and J. Thorpe., Analyzing User Choice in Graphical Passwords., Tech. Report TR-04-01, School of Computer Science Carleton University, Canada, 2004.
    • (2004)
    • Nali, D.1    Thorpe, J.2
  • 25
    • 34548115890 scopus 로고    scopus 로고
    • Available at:, November
    • Pointsec, PicturePINs, Available at: http://www.pointsec.com/news/ download/Pointsec_PPC_2.0_POP_PA1.pdf, November 2002.
    • (2002) PicturePINs
    • Pointsec1
  • 28
    • 34548109612 scopus 로고    scopus 로고
    • Quantifying the Quality of Web Authentication Mechanisms
    • Rinton Press, Available at
    • K. Renaud, Quantifying the Quality of Web Authentication Mechanisms. A Usability Perspective, Journal of Web Engineering, Vol. 0, No. 0, Rinton Press, Available at: http://www.dcs.gla.ac.uk/~karen/Papers/j.pdf, 2003.
    • (2003) A Usability Perspective, Journal of Web Engineering , vol.0 , Issue.0
    • Renaud, K.1
  • 30
    • 34548109608 scopus 로고    scopus 로고
    • Available at:, Retrieved November 4
    • S. Ross, Is It Just My Imagination? Available at: http://research.microsoft.com/displayArticle.aspx?id=417, Retrieved November 4, 2005.
    • (2005) It Just My Imagination
    • Ross, S.1    Is2
  • 32
    • 7544243600 scopus 로고    scopus 로고
    • Available at:, Retrieved November 3, 2005
    • L. Sobrado and J.-C. Birget, Graphical passwords, Available at: http://rutgersscholar.rutgers.edu/volume04/sobrbirg/sobrbirg.htm, Retrieved November 3, 2005.
    • Graphical passwords
    • Sobrado, L.1    Birget, J.-C.2
  • 33
  • 40
    • 60649116908 scopus 로고    scopus 로고
    • S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy and N. Memon, Authentication using graphical passwords: effects of tolerance and image choice, ACM International Conference Proceeding Series; 93, Proceedings of the 2005 symposium on Usable privacy and security, Pittsburgh, Pennsylvania, 2005.
    • S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy and N. Memon, Authentication using graphical passwords: effects of tolerance and image choice, ACM International Conference Proceeding Series; Vol. 93, Proceedings of the 2005 symposium on Usable privacy and security, Pittsburgh, Pennsylvania, 2005.
  • 41
    • 19944381937 scopus 로고    scopus 로고
    • PassPoints: Design and Longitudinal Evaluation of a Graphical Password System, International Journal of Human-Computer Studies
    • Elsevier Science, July
    • S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy and N. Memon, PassPoints: Design and Longitudinal Evaluation of a Graphical Password System, International Journal of Human-Computer Studies, Volume 63, Issues 1-2, Elsevier Science, July 2005.
    • (2005) Issues 1-2 , vol.63
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.-C.3    Brodskiy, A.4    Memon, N.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.