-
1
-
-
0043232732
-
Users are not the enemy: Why users comprise computer security mechanisms and how to take remedial measures
-
A. Adams, M.A. Sasse, "Users are not the enemy: why users comprise computer security mechanisms and how to take remedial measures," Communications of the ACM 4 (1999) 41-46.
-
(1999)
Communications of the ACM
, vol.4
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
33748107711
-
Graphical passwords based on robust discretization
-
Sept., 395-399, Earlier version: Cryptology ePrint Archive, Aug
-
J.C. Birget, D. Hong, N. Memon, "Graphical passwords based on robust discretization", IEEE Transactions on Information Forensics and Security 1(3) (Sept. 2006) 395-399. (Earlier version: Cryptology ePrint Archive, http://eprint.iacr.org/2003/168, Aug. 2003.)
-
(2003)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.3
-
-
Birget, J.C.1
Hong, D.2
Memon, N.3
-
4
-
-
12244260624
-
Graphical Passwords
-
United States Patent 5559961
-
G.E. Blonder, "Graphical Passwords", United States Patent 5559961 (1996).
-
(1996)
-
-
Blonder, G.E.1
-
12
-
-
0018853191
-
The visual stimulus for saccadic eye movement in human observers
-
J. Findlay, "The visual stimulus for saccadic eye movement in human observers", Perception (1980) 7-21.
-
(1980)
Perception
, pp. 7-21
-
-
Findlay, J.1
-
13
-
-
12244303262
-
A password scheme strongly resistant to spy ware
-
Las Vegas NV
-
D. Hong, S. Man, B. Hawes, M. Mathews, "A password scheme strongly resistant to spy ware", Proc. International Conference on Security and Management, Las Vegas NV (2004) 94-100.
-
(2004)
Proc. International Conference on Security and Management
, pp. 94-100
-
-
Hong, D.1
Man, S.2
Hawes, B.3
Mathews, M.4
-
14
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jeremyn, A. Mayer, F. Monrose, M.K. Reiter, A.D. Rubin, "The design and analysis of graphical passwords", Proc. 8th Usenix Security Symposium (1999)
-
(1999)
Proc. 8th Usenix Security Symposium
-
-
Jeremyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
15
-
-
33751429977
-
A remote user authentication scheme using strong graphical passwords
-
W. Ku, M. Tsaur, "A remote user authentication scheme using strong graphical passwords", IEEE Conference on Local Computer Networks (2005) 351-357.
-
(2005)
IEEE Conference on Local Computer Networks
, pp. 351-357
-
-
Ku, W.1
Tsaur, M.2
-
17
-
-
0018543411
-
Password security. A case study
-
R. Morris, K. Thompson, "Password security. A case study", Comm. ACM 22 (1979) 594-597.
-
(1979)
Comm. ACM
, vol.22
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
19
-
-
36849057733
-
The Passfaces System
-
Real User Technology and Products
-
"The Passfaces System", Real User Technology and Products, (2004); http://www.realuser.com/published/RealUserTechnologyAndProducts.pdf
-
(2004)
-
-
-
21
-
-
58749109453
-
Distribution of attention in static and dynamic scenes
-
J. Senders, "Distribution of attention in static and dynamic scenes", Proc. of SPIE, 3016 (1997) 186-194.
-
(1997)
Proc. of SPIE
, vol.3016
, pp. 186-194
-
-
Senders, J.1
-
25
-
-
84861732614
-
Colour spaces: Perceptual, historical and applicational background
-
M. Tkalcic, J.F. Tasic, "Colour spaces: perceptual, historical and applicational background", EUROCON 2003, Computer as a Tool (2003) 304-308.
-
(2003)
EUROCON 2003, Computer as a Tool
, pp. 304-308
-
-
Tkalcic, M.1
Tasic, J.F.2
-
27
-
-
19944381937
-
Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, "Design and longitudinal evaluation of a graphical password system", International J. of Human-Computer Studies 63 (2005) 102-127.
-
(2005)
International J. of Human-Computer Studies
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
28
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system", International Journal of Human Computer Studies (2005) 102-127.
-
(2005)
International Journal of Human Computer Studies
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
30
-
-
0030357240
-
An outstandingness oriented image segmentation and its application
-
J. Zhao, Y. Shimazu, K. Ohta, R. Hayasaka, Y. Matsushita, "An outstandingness oriented image segmentation and its application", ISSPA (1996) 45-48.
-
(1996)
ISSPA
, pp. 45-48
-
-
Zhao, J.1
Shimazu, Y.2
Ohta, K.3
Hayasaka, R.4
Matsushita, Y.5
-
31
-
-
58449120409
-
-
TR-07-05, School of Computer Science, Carleton University, Feb., Added in proofs
-
J. Thorpe, P.C. van Oorschot, "Human-seeded attacks and exploiting hot-spots in graphical passwords", TR-07-05, School of Computer Science, Carleton University, (Feb. 2007), (Added in proofs).
-
(2007)
Human-seeded attacks and exploiting hot-spots in graphical passwords
-
-
Thorpe, J.1
van Oorschot, P.C.2
|