-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A., & Sasse, M. (1999). Users are not the enemy. Communications of the ACM, 42(12), 41-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.2
-
2
-
-
0003429117
-
Are passfaces more usable than passwords? A field trial investigation
-
Brostoff, S., & Sasse, M. A. (2000). Are passfaces more usable than passwords? A field trial investigation. In Proc. HCI 2000.
-
(2000)
Proc. HCI 2000
-
-
Brostoff, S.1
Sasse, M.A.2
-
3
-
-
0037345102
-
Theoretical models of cognitive aging and implications for translational research in medicine
-
Brown, SC. & Park, D.C. (2003) Theoretical models of cognitive aging and implications for translational research in medicine. Gerontologist, 43(1), 57-67.
-
(2003)
Gerontologist
, vol.43
, Issue.1
, pp. 57-67
-
-
Brown, S.C.1
Park, D.C.2
-
5
-
-
19944372131
-
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
-
DeAngeli, A., Coventry, L., Johnson, G., & Renaud, K. (2005). Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63(2005), 128-152.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, pp. 128-152
-
-
DeAngeli, A.1
Coventry, L.2
Johnson, G.3
Renaud, K.4
-
7
-
-
9244238064
-
Metaphors of Human Thinking in HCI: Habit, Stream of Thought, Awareness, Utterance, and Knowing
-
Frøkjær, E. & Hombæk, K. (2002). Metaphors of Human Thinking in HCI: Habit, Stream of Thought, Awareness, Utterance, and Knowing. In Proc. HF2002/OzCHI 2002.
-
(2002)
Proc. HF2002/OzCHI 2002
-
-
Frøkjær, E.1
Hombæk, K.2
-
9
-
-
0024749433
-
The case against user interface consistency
-
Grudin, J. (1989). The case against user interface consistency. Communications of the ACM, 32(10), 1164-1173.
-
(1989)
Communications of the ACM
, vol.32
, Issue.10
, pp. 1164-1173
-
-
Grudin, J.1
-
10
-
-
85084161999
-
The design and analysis of graphical passwords
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M., & Rubin, A. (1999). The design and analysis of graphical passwords. In Proc. 8th USENIX Security Symposium.
-
(1999)
Proc. 8th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
12
-
-
9944240263
-
My password is here! An investigation into visuo-spatial authentication mechanisms
-
Renaud, K., & De Angeli, A. (2004). My password is here! An investigation into visuo-spatial authentication mechanisms. Interacting with computers, 16(2004), 1017-1041.
-
(2004)
Interacting with computers
, vol.16
, pp. 1017-1041
-
-
Renaud, K.1
De Angeli, A.2
-
14
-
-
0035387175
-
Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security
-
Sasse, M., Brostoff, S., & Weirich, D. (2001). Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3), 122-131.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.1
Brostoff, S.2
Weirich, D.3
-
15
-
-
0038226921
-
Moving from the design of usable security technologies to the design of useful secure applications
-
Smetters, D. K., & Grinter, R. E. (2002). Moving from the design of usable security technologies to the design of useful secure applications. In Proc. New Security Paradigms Workshop 2002, 82-89.
-
(2002)
Proc. New Security Paradigms Workshop 2002
, pp. 82-89
-
-
Smetters, D.K.1
Grinter, R.E.2
-
17
-
-
35348890837
-
Using personal photos as pictorial passwords
-
Tullis, T. S., & Tedesco, D. P. (2005). Using personal photos as pictorial passwords. In Proc. CHI 2005.
-
(2005)
Proc. CHI 2005
-
-
Tullis, T.S.1
Tedesco, D.P.2
-
19
-
-
33748943409
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., & Memon, N. (2005a). Authentication using graphical passwords: effects of tolerance and image choice. In Proc. SOUPS 2005.
-
(2005)
Proc. SOUPS 2005
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
20
-
-
19944381937
-
-
International Journal of Human, Computer Studies
-
Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., & Memon, N. (2005b). PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human - Computer Studies.
-
(2005)
PassPoints: Design and longitudinal evaluation of a graphical password system
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
21
-
-
0008915230
-
The memorability and security of passwords - Some empirical results
-
No. 500, Cambridge: Cambridge University Computer Laboratory
-
Yan, J., Blackwell, A., Anderson, R., & Grant, A. (2001). The memorability and security of passwords - Some empirical results. (Technical report No. 500). Cambridge: Cambridge University Computer Laboratory.
-
(2001)
Technical report
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|