메뉴 건너뛰기




Volumn 10, Issue 4, 2008, Pages

On predictive models and user-drawn graphical passwords

Author keywords

Dictionary attack; Draw a Secret; Graphical dictionary; Graphical passwords; Memorable passwords; Modeling user choice; Password complexity factors

Indexed keywords

DICTIONARY ATTACKS; DRAW-A-SECRET; GRAPHICAL PASSWORDS; MEMORABLE PASSWORDS; MODELING USER CHOICE; PASSWORD COMPLEXITY FACTORS; VISUAL RECALLS;

EID: 39149106769     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1284680.1284685     Document Type: Article
Times cited : (69)

References (48)
  • 1
    • 33750976116 scopus 로고
    • Symmetry, information and memory for patterns
    • ATTNEAVE, F. 1955. Symmetry, information and memory for patterns. American Journal of Psychology 68, 209-222.
    • (1955) American Journal of Psychology , vol.68 , pp. 209-222
    • ATTNEAVE, F.1
  • 2
    • 0011289420 scopus 로고
    • Physical determinants of the judged complexity of shapes
    • ATTNEAVE, F. 1957. Physical determinants of the judged complexity of shapes. Journal of Experimental Psychology 53, 4, 221-227.
    • (1957) Journal of Experimental Psychology , vol.53 , Issue.4 , pp. 221-227
    • ATTNEAVE, F.1
  • 3
    • 33748107711 scopus 로고    scopus 로고
    • BIRGET, J. C., HONG, D., and MEMON, N. 2003. Graphical passwords based on robust discretization. IEEE Transactions on Information Forensics and Security 1, 3 (Sept.), 395-399. Cryptology ePrint Archive, Report 2003/168. http://eprint.iacr.org/, site accessed Jan. 12, 2004.
    • BIRGET, J. C., HONG, D., and MEMON, N. 2003. Graphical passwords based on robust discretization. IEEE Transactions on Information Forensics and Security 1, 3 (Sept.), 395-399. Cryptology ePrint Archive, Report 2003/168. http://eprint.iacr.org/, site accessed Jan. 12, 2004.
  • 4
    • 12244260624 scopus 로고    scopus 로고
    • Graphical passwords
    • United States Patent 5559961
    • BLONDER, G. 1996. Graphical passwords. United States Patent 5559961.
    • (1996)
    • BLONDER, G.1
  • 6
    • 0345593143 scopus 로고
    • Short studies in memory and association from the wellesley college laboratory
    • CALKINS, M. 1898. Short studies in memory and association from the wellesley college laboratory. Psychological Review 5, 451-462.
    • (1898) Psychological Review , vol.5 , pp. 451-462
    • CALKINS, M.1
  • 7
    • 85025673016 scopus 로고
    • Weak keys for IDEA
    • Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
    • DAEMEN, J., GOVAERTS, R., AND VANDEWALLE, J. 1993. Weak keys for IDEA. In Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology. Lecture Notes In Computer Science; Vol. 773, 224-231.
    • (1993) Lecture Notes In Computer Science , vol.773 , pp. 224-231
    • DAEMEN, J.1    GOVAERTS, R.2    VANDEWALLE, J.3
  • 10
    • 0347455573 scopus 로고
    • Identification of dot patterns from memory as a function of complexity
    • FRENCH, R.-S. 1954. Identification of dot patterns from memory as a function of complexity. Journal of Experimental Psychology 47, 22-26.
    • (1954) Journal of Experimental Psychology , vol.47 , pp. 22-26
    • FRENCH, R.-S.1
  • 11
    • 0038049391 scopus 로고    scopus 로고
    • Doodling our way to better authentication
    • April 20-25, ACM Press, New York, CHI '02 extended abstracts on Human Factors in Computer Systems
    • GOLDBERG, J., HAGMAN, J., AND SAZAWAL, V. 2002. Doodling our way to better authentication. In Conference on Human Factors and Computing Systems (April 20-25). ACM Press, New York. 868-869. CHI '02 extended abstracts on Human Factors in Computer Systems.
    • (2002) Conference on Human Factors and Computing Systems , pp. 868-869
    • GOLDBERG, J.1    HAGMAN, J.2    SAZAWAL, V.3
  • 13
    • 0347150493 scopus 로고
    • Measurement of visual memory span by means of the recall of dot-in-matrix patterns
    • ICHIKAWA, S.-I. 1982. Measurement of visual memory span by means of the recall of dot-in-matrix patterns. Behavior Research Methods and Instrumentation 14, 3, 309-313.
    • (1982) Behavior Research Methods and Instrumentation , vol.14 , Issue.3 , pp. 309-313
    • ICHIKAWA, S.-I.1
  • 14
    • 39149118494 scopus 로고    scopus 로고
    • JANSEN, W., GAVRILLA, S., KOROLEV, V., AYERS, R., AND R., S. 2003. Picture password: A visual login technique for mobile devices. NIST Report - NISTIR7030.
    • JANSEN, W., GAVRILLA, S., KOROLEV, V., AYERS, R., AND R., S. 2003. Picture password: A visual login technique for mobile devices. NIST Report - NISTIR7030.
  • 16
    • 0000305344 scopus 로고
    • An experimental study of memory
    • KIRKPATRICK, E. A. 1894. An experimental study of memory. Psychological Review 1, 602-609.
    • (1894) Psychological Review , vol.1 , pp. 602-609
    • KIRKPATRICK, E.A.1
  • 17
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • KLEIN, D. 1990. Foiling the cracker: A survey of, and improvements to, password security. In The 2nd USENIX Security Workshop. 5-14.
    • (1990) The 2nd USENIX Security Workshop , pp. 5-14
    • KLEIN, D.1
  • 19
    • 84955153370 scopus 로고
    • Picture Memory
    • J. C. Yuille, Ed. Lawrence Erlbaum, Mahwah, NJ
    • MADIGAN, S. 1983. Picture Memory. In Imagery, Memory and Cognition, J. C. Yuille, Ed. Lawrence Erlbaum, Mahwah, NJ. 65-89.
    • (1983) Imagery, Memory and Cognition , pp. 65-89
    • MADIGAN, S.1
  • 20
    • 2342647732 scopus 로고
    • Factors affecting item recovery and hypermnesia in free recall
    • MADIGAN, S. AND LAWRENCE, V. 1980. Factors affecting item recovery and hypermnesia in free recall. American Journal of Psychology 93, 489-504.
    • (1980) American Journal of Psychology , vol.93 , pp. 489-504
    • MADIGAN, S.1    LAWRENCE, V.2
  • 24
    • 39149113346 scopus 로고    scopus 로고
    • Graphical passwords
    • L. Cranor and S. Garfinkel, Eds. O'Reilly Media Inc, Sebastopol, CA, Chapter 9, 147-164
    • MONROSE, F. AND REITER, M. K. 2005. Graphical passwords. In Security and Usability, L. Cranor and S. Garfinkel, Eds. O'Reilly Media Inc., Sebastopol, CA, Chapter 9, 147-164.
    • (2005) Security and Usability
    • MONROSE, F.1    REITER, M.K.2
  • 25
    • 21644466970 scopus 로고    scopus 로고
    • Crack password cracker
    • site accessed Jan. 12
    • MUFFETT, A. 2004. Crack password cracker. http://ciac.llnl.gov/ ciac/ToolsUnixAuth.html, site accessed Jan. 12, 2004.
    • (2004)
    • MUFFETT, A.1
  • 27
    • 21644455927 scopus 로고    scopus 로고
    • Analyzing User Choice in Graphical Passwords
    • Tech. Report TR-04-01, School of Computer Science, Carleton University, Canada
    • NALI, D. AND THORPE, J. 2004. Analyzing User Choice in Graphical Passwords. Tech. Report TR-04-01, School of Computer Science, Carleton University, Canada, http://www.scs.carleton.ca/research/ tech_reports/2004/TR-04-01.pdf.
    • (2004)
    • NALI, D.1    THORPE, J.2
  • 28
    • 39149135441 scopus 로고    scopus 로고
    • OPENWALL PROJECT. 2004a. John the Ripper password cracker, http://www.openwall.com/john/, site accessed Jan.7, 2004.
    • OPENWALL PROJECT. 2004a. John the Ripper password cracker, http://www.openwall.com/john/, site accessed Jan.7, 2004.
  • 29
    • 39149104890 scopus 로고    scopus 로고
    • OPENWALL PROJECT. 2004b. Wordlists. http://www.openwall.com/passwords/wordlists/, site accessed Jan.7 2004.
    • OPENWALL PROJECT. 2004b. Wordlists. http://www.openwall.com/passwords/wordlists/, site accessed Jan.7 2004.
  • 34
    • 39149102036 scopus 로고    scopus 로고
    • REAL USER CORPORATION. 2004. About passfaces. http://www.realuser.eom/cgi-bin/ru.exe/_/homepages/technology/passface.htm, site accessed May 25, 2004.
    • REAL USER CORPORATION. 2004. About passfaces. http://www.realuser.eom/cgi-bin/ru.exe/_/homepages/technology/passface.htm, site accessed May 25, 2004.
  • 35
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • SHANNON, C. 1948. A mathematical theory of communication. The Bell System Technical Journal 27, 379-423.
    • (1948) The Bell System Technical Journal , vol.27 , pp. 379-423
    • SHANNON, C.1
  • 36
    • 0024681099 scopus 로고
    • Crisis and aftermath (The Internet worm)
    • SPAFFORD, E. 1989. Crisis and aftermath (The Internet worm). Comm. of the ACM 32(6), 678-687.
    • (1989) Comm. of the ACM , vol.32 , Issue.6 , pp. 678-687
    • SPAFFORD, E.1
  • 37
    • 0026869371 scopus 로고
    • OPUS: Preventing weak password choices
    • SPAFFORD, E. H. 1992. OPUS: Preventing weak password choices. Comput. Secur. 11, 3, 273-278.
    • (1992) Comput. Secur , vol.11 , Issue.3 , pp. 273-278
    • SPAFFORD, E.H.1
  • 39
    • 38049015008 scopus 로고    scopus 로고
    • M.S. thesis, School of Information Technology and Engineering, University of Ottawa, Canada
    • TAO, H. 2006. Pass-Go, a New Graphical Password Scheme. M.S. thesis, School of Information Technology and Engineering, University of Ottawa, Canada.
    • (2006) Pass-Go, a New Graphical Password Scheme
    • TAO, H.1
  • 40
    • 85084163855 scopus 로고    scopus 로고
    • THORPE, J. AND VAN OORSCHOT, P. 2004a. Graphical dictionaries and the memorable space of graphical passwords. In 13th USENIX Security Symposium (Aug. 9-13).
    • THORPE, J. AND VAN OORSCHOT, P. 2004a. Graphical dictionaries and the memorable space of graphical passwords. In 13th USENIX Security Symposium (Aug. 9-13).
  • 41
    • 21644474142 scopus 로고    scopus 로고
    • THORPE, J. AND VAN OORSCHOT, P. 2004b. Towards secure design choices for implementing graphical passwords. In 20th Annual Computer Security Applications Conference (ACSAC 2004) (Dec. 6-10). IEEE, Los Alamitos, CA.
    • THORPE, J. AND VAN OORSCHOT, P. 2004b. Towards secure design choices for implementing graphical passwords. In 20th Annual Computer Security Applications Conference (ACSAC 2004) (Dec. 6-10). IEEE, Los Alamitos, CA.
  • 42
    • 39149089550 scopus 로고    scopus 로고
    • THORPE, J. AND VAN OORSCHOT, P. 2005. On the Security of Graphical Password Schemes (Extended Version). Tech. Report TR-05-11, School of Computer Science, Carleton University, Canada, http://www.scs.carleton.ca/researcli/tech_reports/2005/download/TR-05-11.pdf.
    • THORPE, J. AND VAN OORSCHOT, P. 2005. On the Security of Graphical Password Schemes (Extended Version). Tech. Report TR-05-11, School of Computer Science, Carleton University, Canada, http://www.scs.carleton.ca/researcli/tech_reports/2005/download/TR-05-11.pdf.
  • 44
    • 33750906057 scopus 로고    scopus 로고
    • VAN OORSCHOT, P. C. AND STUBBLEBINE, S. 2006. On countering online dictionary attacks with login histories and humans-in-the-loop. ACM TISSEC 9, 3 (Aug.), 235-258.
    • VAN OORSCHOT, P. C. AND STUBBLEBINE, S. 2006. On countering online dictionary attacks with login histories and humans-in-the-loop. ACM TISSEC 9, 3 (Aug.), 235-258.
  • 45
    • 1942455789 scopus 로고    scopus 로고
    • Neural activity predicts individual differences in visual working memory capacity
    • VOGEL, E. K. AND MACHIZAWA, M. G. 2004. Neural activity predicts individual differences in visual working memory capacity. Nature (London) 428, 748-751.
    • (2004) Nature (London) , vol.428 , pp. 748-751
    • VOGEL, E.K.1    MACHIZAWA, M.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.