-
1
-
-
33846307457
-
Graphical passwords: A survey
-
Dec. 5-9
-
X. Suo, Y. Zhu, and G. S. Owen, "Graphical passwords: A survey," in Proc. 21st Annu. Comput. Security Appl. Conf., Dec. 5-9, 2005, pp. 463-472.
-
(2005)
Proc. 21st Annu. Comput. Security Appl. Conf
, pp. 463-472
-
-
Suo, X.1
Zhu, Y.2
Owen, G.S.3
-
2
-
-
0040231044
-
Foiling the cracker: A survey of, and improvement to passwords security
-
D. V. Klein, "Foiling the cracker: A survey of, and improvement to passwords security," in Proc. USENIX Security Workshop, 1990, pp. 5-14.
-
(1990)
Proc. USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.V.1
-
4
-
-
49549097577
-
-
T. Kitten, Keeping an Eye on the ATM. (2005, Jul. 11). [Online]. Available: ATMMarketPlace.com
-
T. Kitten, Keeping an Eye on the ATM. (2005, Jul. 11). [Online]. Available: ATMMarketPlace.com
-
-
-
-
6
-
-
12244260624
-
Graphical password,
-
U.S. Patent 5 559 961, Sep. 24
-
G. E. Blonder, "Graphical password," U.S. Patent 5 559 961, Sep. 24, 1996.
-
(1996)
-
-
Blonder, G.E.1
-
7
-
-
85084161493
-
Déjà Vu: A user study using images for authentication
-
Denver, CO, Aug
-
R. Dhamija and A. Perrig, "Déjà Vu: A user study using images for authentication," in Proc. 9th USINEX Security Symp., Denver, CO, Aug. 2000, pp. 45-58.
-
(2000)
Proc. 9th USINEX Security Symp
, pp. 45-58
-
-
Dhamija, R.1
Perrig, A.2
-
8
-
-
49549107954
-
-
Real User Corporation, The Science Behind Passfaces. (2005, Oct.). [Online]. Available: http://www.realusers.com
-
Real User Corporation, The Science Behind Passfaces. (2005, Oct.). [Online]. Available: http://www.realusers.com
-
-
-
-
9
-
-
85084162383
-
On user choice in graphical password schemes
-
San Diego, CA, Aug
-
D. Davis, E Monrose, and M. K. Reiter, "On user choice in graphical password schemes," in Proc. 13th USENIX Security Symp., San Diego, CA, Aug. 2004, pp. 1-14.
-
(2004)
Proc. 13th USENIX Security Symp
, pp. 1-14
-
-
Davis, D.1
Monrose, E.2
Reiter, M.K.3
-
10
-
-
60649116908
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
Pittsburgh, PA, Jul
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Effects of tolerance and image choice," in Proc. Symp. Usable Privacy Security, Pittsburgh, PA, Jul. 2005, pp. 1-12.
-
(2005)
Proc. Symp. Usable Privacy Security
, pp. 1-12
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
11
-
-
33748943409
-
Authentication using graphical passwords: Basic results
-
Las Vegas, NV, Jul. 25-27
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, " Authentication using graphical passwords: Basic results," in Proc. Hwnan-Comput. Interaction Int., Las Vegas, NV, Jul. 25-27, 2005.
-
(2005)
Proc. Hwnan-Comput. Interaction Int
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
12
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
Jul
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," Int. J. Human-Comput. Stud. (Special Issue on HCI Research in Privacy and Security), vol. 63, no. 1/2, pp. 102-127, Jul. 2005.
-
(2005)
Int. J. Human-Comput. Stud. (Special Issue on HCI Research in Privacy and Security)
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
13
-
-
85084161999
-
The design and analysis of graphical passwords
-
Washington DC, Aug
-
I. Jermyn, A. Mayer, E Monrose, M. K. Reiter, and A. D. Rubin, "The design and analysis of graphical passwords," in Proc. 8th USENIX Security Symp., Washington DC, Aug. 1999, pp. 1-14.
-
(1999)
Proc. 8th USENIX Security Symp
, pp. 1-14
-
-
Jermyn, I.1
Mayer, A.2
Monrose, E.3
Reiter, M.K.4
Rubin, A.D.5
-
14
-
-
85084163855
-
Graphical dictionaries and the memorable space of graphical passwords
-
San Diego, CA, Aug. 9-13
-
J. Tborpe and P. C. van Oorschot, "Graphical dictionaries and the memorable space of graphical passwords," in Proc. USENIX Security San Diego, CA, Aug. 9-13, 2004, p. 10.
-
(2004)
Proc. USENIX Security
, pp. 10
-
-
Tborpe, J.1
van Oorschot, P.C.2
-
15
-
-
0043232732
-
Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
-
Dec
-
A. Adams and M. A. Sasse, "Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures," Commun. ACM, vol. 42, no. 12, pp. 40-46, Dec. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
16
-
-
34250621462
-
A novel 3D graphical password schema
-
Jul
-
F. A. Alsulaiman and A. El Saddik, "A novel 3D graphical password schema," in Proc. IEEE Int. Conf. Virtual Environ., Human-Comput. Interfaces, Meas. Syst., Jul. 2006, pp. 125-128.
-
(2006)
Proc. IEEE Int. Conf. Virtual Environ., Human-Comput. Interfaces, Meas. Syst
, pp. 125-128
-
-
Alsulaiman, F.A.1
El Saddik, A.2
|