-
1
-
-
33750976116
-
Symmetry, information and memory for patterns
-
ATTNEAVE, F. 1955. Symmetry, information and memory for patterns. American Journal of Psychology 68, 209-222.
-
(1955)
American Journal of Psychology
, vol.68
, pp. 209-222
-
-
ATTNEAVE, F.1
-
2
-
-
0011289420
-
Physical determinants of the judged complexity of shapes
-
ATTNEAVE, F. 1957. Physical determinants of the judged complexity of shapes. Journal of Experimental Psychology 53, 4, 221-227.
-
(1957)
Journal of Experimental Psychology
, vol.53
, Issue.4
, pp. 221-227
-
-
ATTNEAVE, F.1
-
3
-
-
33748107711
-
-
BIRGET, J. C., HONG, D., and MEMON, N. 2003. Graphical passwords based on robust discretization. IEEE Transactions on Information Forensics and Security 1, 3 (Sept.), 395-399. Cryptology ePrint Archive, Report 2003/168. http://eprint.iacr.org/, site accessed Jan. 12, 2004.
-
BIRGET, J. C., HONG, D., and MEMON, N. 2003. Graphical passwords based on robust discretization. IEEE Transactions on Information Forensics and Security 1, 3 (Sept.), 395-399. Cryptology ePrint Archive, Report 2003/168. http://eprint.iacr.org/, site accessed Jan. 12, 2004.
-
-
-
-
4
-
-
12244260624
-
Graphical passwords
-
United States Patent 5559961
-
BLONDER, G. 1996. Graphical passwords. United States Patent 5559961.
-
(1996)
-
-
BLONDER, G.1
-
5
-
-
0016612492
-
Comprehension and memory for pictures
-
BOWER, G. H., KARLIN, M. B., AND DUECK, A. 1975. Comprehension and memory for pictures. Memory and Cognition 3, 216-220.
-
(1975)
Memory and Cognition
, vol.3
, pp. 216-220
-
-
BOWER, G.H.1
KARLIN, M.B.2
DUECK, A.3
-
6
-
-
0345593143
-
Short studies in memory and association from the wellesley college laboratory
-
CALKINS, M. 1898. Short studies in memory and association from the wellesley college laboratory. Psychological Review 5, 451-462.
-
(1898)
Psychological Review
, vol.5
, pp. 451-462
-
-
CALKINS, M.1
-
7
-
-
85025673016
-
Weak keys for IDEA
-
Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
-
DAEMEN, J., GOVAERTS, R., AND VANDEWALLE, J. 1993. Weak keys for IDEA. In Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology. Lecture Notes In Computer Science; Vol. 773, 224-231.
-
(1993)
Lecture Notes In Computer Science
, vol.773
, pp. 224-231
-
-
DAEMEN, J.1
GOVAERTS, R.2
VANDEWALLE, J.3
-
10
-
-
0347455573
-
Identification of dot patterns from memory as a function of complexity
-
FRENCH, R.-S. 1954. Identification of dot patterns from memory as a function of complexity. Journal of Experimental Psychology 47, 22-26.
-
(1954)
Journal of Experimental Psychology
, vol.47
, pp. 22-26
-
-
FRENCH, R.-S.1
-
11
-
-
0038049391
-
Doodling our way to better authentication
-
April 20-25, ACM Press, New York, CHI '02 extended abstracts on Human Factors in Computer Systems
-
GOLDBERG, J., HAGMAN, J., AND SAZAWAL, V. 2002. Doodling our way to better authentication. In Conference on Human Factors and Computing Systems (April 20-25). ACM Press, New York. 868-869. CHI '02 extended abstracts on Human Factors in Computer Systems.
-
(2002)
Conference on Human Factors and Computing Systems
, pp. 868-869
-
-
GOLDBERG, J.1
HAGMAN, J.2
SAZAWAL, V.3
-
12
-
-
33745886578
-
A convenient method for securely managing passwords
-
ACM Press, New York
-
HALDERMAN, J. A., WATERS, B., AND FELTEN, E. W. 2005. A convenient method for securely managing passwords. In Proceedings of the 14th International World Wide Web Conference. ACM Press, New York. 471-479.
-
(2005)
Proceedings of the 14th International World Wide Web Conference
, pp. 471-479
-
-
HALDERMAN, J.A.1
WATERS, B.2
FELTEN, E.W.3
-
13
-
-
0347150493
-
Measurement of visual memory span by means of the recall of dot-in-matrix patterns
-
ICHIKAWA, S.-I. 1982. Measurement of visual memory span by means of the recall of dot-in-matrix patterns. Behavior Research Methods and Instrumentation 14, 3, 309-313.
-
(1982)
Behavior Research Methods and Instrumentation
, vol.14
, Issue.3
, pp. 309-313
-
-
ICHIKAWA, S.-I.1
-
14
-
-
39149118494
-
-
JANSEN, W., GAVRILLA, S., KOROLEV, V., AYERS, R., AND R., S. 2003. Picture password: A visual login technique for mobile devices. NIST Report - NISTIR7030.
-
JANSEN, W., GAVRILLA, S., KOROLEV, V., AYERS, R., AND R., S. 2003. Picture password: A visual login technique for mobile devices. NIST Report - NISTIR7030.
-
-
-
-
15
-
-
85084161999
-
The design and analysis of graphical passwords
-
JERMYN, I., MAYER, A., MONROSE, F., REITER, M., AND RUBIN, A. 1999. The design and analysis of graphical passwords. In 8th USENIX Security Symposium.
-
(1999)
8th USENIX Security Symposium
-
-
JERMYN, I.1
MAYER, A.2
MONROSE, F.3
REITER, M.4
RUBIN, A.5
-
16
-
-
0000305344
-
An experimental study of memory
-
KIRKPATRICK, E. A. 1894. An experimental study of memory. Psychological Review 1, 602-609.
-
(1894)
Psychological Review
, vol.1
, pp. 602-609
-
-
KIRKPATRICK, E.A.1
-
17
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
KLEIN, D. 1990. Foiling the cracker: A survey of, and improvements to, password security. In The 2nd USENIX Security Workshop. 5-14.
-
(1990)
The 2nd USENIX Security Workshop
, pp. 5-14
-
-
KLEIN, D.1
-
18
-
-
34250767745
-
Human selection of mnemonic phrase-based passwords
-
ACM Press, New York
-
KUO, C., ROMANOSKY, S., AND CRANOR, L. 2006. Human selection of mnemonic phrase-based passwords. In 2nd Symp. Usable Privacy and Security (SOUPS). ACM Press, New York. 67-78.
-
(2006)
2nd Symp. Usable Privacy and Security (SOUPS)
, pp. 67-78
-
-
KUO, C.1
ROMANOSKY, S.2
CRANOR, L.3
-
19
-
-
84955153370
-
Picture Memory
-
J. C. Yuille, Ed. Lawrence Erlbaum, Mahwah, NJ
-
MADIGAN, S. 1983. Picture Memory. In Imagery, Memory and Cognition, J. C. Yuille, Ed. Lawrence Erlbaum, Mahwah, NJ. 65-89.
-
(1983)
Imagery, Memory and Cognition
, pp. 65-89
-
-
MADIGAN, S.1
-
20
-
-
2342647732
-
Factors affecting item recovery and hypermnesia in free recall
-
MADIGAN, S. AND LAWRENCE, V. 1980. Factors affecting item recovery and hypermnesia in free recall. American Journal of Psychology 93, 489-504.
-
(1980)
American Journal of Psychology
, vol.93
, pp. 489-504
-
-
MADIGAN, S.1
LAWRENCE, V.2
-
22
-
-
84944878354
-
-
CRC Press, Boca Raton, FL, Note 8.8
-
MENEZES, A. J., VAN OORSCHOT, P. C., AND VANSTONE, S. A. 1996. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL. 290-291. Note 8.8.
-
(1996)
Handbook of Applied Cryptography
, pp. 290-291
-
-
MENEZES, A.J.1
VAN OORSCHOT, P.C.2
VANSTONE, S.A.3
-
24
-
-
39149113346
-
Graphical passwords
-
L. Cranor and S. Garfinkel, Eds. O'Reilly Media Inc, Sebastopol, CA, Chapter 9, 147-164
-
MONROSE, F. AND REITER, M. K. 2005. Graphical passwords. In Security and Usability, L. Cranor and S. Garfinkel, Eds. O'Reilly Media Inc., Sebastopol, CA, Chapter 9, 147-164.
-
(2005)
Security and Usability
-
-
MONROSE, F.1
REITER, M.K.2
-
25
-
-
21644466970
-
Crack password cracker
-
site accessed Jan. 12
-
MUFFETT, A. 2004. Crack password cracker. http://ciac.llnl.gov/ ciac/ToolsUnixAuth.html, site accessed Jan. 12, 2004.
-
(2004)
-
-
MUFFETT, A.1
-
27
-
-
21644455927
-
Analyzing User Choice in Graphical Passwords
-
Tech. Report TR-04-01, School of Computer Science, Carleton University, Canada
-
NALI, D. AND THORPE, J. 2004. Analyzing User Choice in Graphical Passwords. Tech. Report TR-04-01, School of Computer Science, Carleton University, Canada, http://www.scs.carleton.ca/research/ tech_reports/2004/TR-04-01.pdf.
-
(2004)
-
-
NALI, D.1
THORPE, J.2
-
28
-
-
39149135441
-
-
OPENWALL PROJECT. 2004a. John the Ripper password cracker, http://www.openwall.com/john/, site accessed Jan.7, 2004.
-
OPENWALL PROJECT. 2004a. John the Ripper password cracker, http://www.openwall.com/john/, site accessed Jan.7, 2004.
-
-
-
-
29
-
-
39149104890
-
-
OPENWALL PROJECT. 2004b. Wordlists. http://www.openwall.com/passwords/wordlists/, site accessed Jan.7 2004.
-
OPENWALL PROJECT. 2004b. Wordlists. http://www.openwall.com/passwords/wordlists/, site accessed Jan.7 2004.
-
-
-
-
34
-
-
39149102036
-
-
REAL USER CORPORATION. 2004. About passfaces. http://www.realuser.eom/cgi-bin/ru.exe/_/homepages/technology/passface.htm, site accessed May 25, 2004.
-
REAL USER CORPORATION. 2004. About passfaces. http://www.realuser.eom/cgi-bin/ru.exe/_/homepages/technology/passface.htm, site accessed May 25, 2004.
-
-
-
-
35
-
-
84856043672
-
A mathematical theory of communication
-
SHANNON, C. 1948. A mathematical theory of communication. The Bell System Technical Journal 27, 379-423.
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
SHANNON, C.1
-
36
-
-
0024681099
-
Crisis and aftermath (The Internet worm)
-
SPAFFORD, E. 1989. Crisis and aftermath (The Internet worm). Comm. of the ACM 32(6), 678-687.
-
(1989)
Comm. of the ACM
, vol.32
, Issue.6
, pp. 678-687
-
-
SPAFFORD, E.1
-
37
-
-
0026869371
-
OPUS: Preventing weak password choices
-
SPAFFORD, E. H. 1992. OPUS: Preventing weak password choices. Comput. Secur. 11, 3, 273-278.
-
(1992)
Comput. Secur
, vol.11
, Issue.3
, pp. 273-278
-
-
SPAFFORD, E.H.1
-
39
-
-
38049015008
-
-
M.S. thesis, School of Information Technology and Engineering, University of Ottawa, Canada
-
TAO, H. 2006. Pass-Go, a New Graphical Password Scheme. M.S. thesis, School of Information Technology and Engineering, University of Ottawa, Canada.
-
(2006)
Pass-Go, a New Graphical Password Scheme
-
-
TAO, H.1
-
40
-
-
85084163855
-
-
THORPE, J. AND VAN OORSCHOT, P. 2004a. Graphical dictionaries and the memorable space of graphical passwords. In 13th USENIX Security Symposium (Aug. 9-13).
-
THORPE, J. AND VAN OORSCHOT, P. 2004a. Graphical dictionaries and the memorable space of graphical passwords. In 13th USENIX Security Symposium (Aug. 9-13).
-
-
-
-
41
-
-
21644474142
-
-
THORPE, J. AND VAN OORSCHOT, P. 2004b. Towards secure design choices for implementing graphical passwords. In 20th Annual Computer Security Applications Conference (ACSAC 2004) (Dec. 6-10). IEEE, Los Alamitos, CA.
-
THORPE, J. AND VAN OORSCHOT, P. 2004b. Towards secure design choices for implementing graphical passwords. In 20th Annual Computer Security Applications Conference (ACSAC 2004) (Dec. 6-10). IEEE, Los Alamitos, CA.
-
-
-
-
42
-
-
39149089550
-
-
THORPE, J. AND VAN OORSCHOT, P. 2005. On the Security of Graphical Password Schemes (Extended Version). Tech. Report TR-05-11, School of Computer Science, Carleton University, Canada, http://www.scs.carleton.ca/researcli/tech_reports/2005/download/TR-05-11.pdf.
-
THORPE, J. AND VAN OORSCHOT, P. 2005. On the Security of Graphical Password Schemes (Extended Version). Tech. Report TR-05-11, School of Computer Science, Carleton University, Canada, http://www.scs.carleton.ca/researcli/tech_reports/2005/download/TR-05-11.pdf.
-
-
-
-
44
-
-
33750906057
-
-
VAN OORSCHOT, P. C. AND STUBBLEBINE, S. 2006. On countering online dictionary attacks with login histories and humans-in-the-loop. ACM TISSEC 9, 3 (Aug.), 235-258.
-
VAN OORSCHOT, P. C. AND STUBBLEBINE, S. 2006. On countering online dictionary attacks with login histories and humans-in-the-loop. ACM TISSEC 9, 3 (Aug.), 235-258.
-
-
-
-
45
-
-
1942455789
-
Neural activity predicts individual differences in visual working memory capacity
-
VOGEL, E. K. AND MACHIZAWA, M. G. 2004. Neural activity predicts individual differences in visual working memory capacity. Nature (London) 428, 748-751.
-
(2004)
Nature (London)
, vol.428
, pp. 748-751
-
-
VOGEL, E.K.1
MACHIZAWA, M.G.2
-
47
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
WIEDENBECK, S., WATERS, J., BIRGET, J., BRODSKIY, A., AND MEMON, N. 2005. PassPoints: Design and longitudinal evaluation of a graphical password system. International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security) 63, 102-127.
-
(2005)
International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security) 63
, pp. 102-127
-
-
WIEDENBECK, S.1
WATERS, J.2
BIRGET, J.3
BRODSKIY, A.4
MEMON, N.5
|