-
1
-
-
60349100023
-
-
quot;Authentication, in Wikipedia, the free encyclopedi. http://cn.wikipedia.org/wiki/Authentication.
-
quot;Authentication," in Wikipedia, the free encyclopedi. http://cn.wikipedia.org/wiki/Authentication.
-
-
-
-
2
-
-
60349128943
-
-
quot;Amecisco Inc., http://www.kcyloggcr.com.
-
quot;Amecisco Inc.," http://www.kcyloggcr.com.
-
-
-
-
3
-
-
12244260624
-
Graphical passwords,
-
US Patent 5,559,961
-
G. E. Blonder, "Graphical passwords," US Patent 5,559,961, 1996.
-
(1996)
-
-
Blonder, G.E.1
-
5
-
-
0002618895
-
-
USENIX Association Berkeley, CA, USA
-
R. Dhamija and A. Perrig, "Déjà Vu: a user study using images for authentication," USENIX Association Berkeley, CA, USA, 2000, pp. 4-4.
-
(2000)
Déjà Vu: A user study using images for authentication
, pp. 4-4
-
-
Dhamija, R.1
Perrig, A.2
-
6
-
-
3042844145
-
Photographic authentication through untrusted terminals
-
T. Pering, M. Sundar, J. Light, and R. Want, "Photographic authentication through untrusted terminals," Pervasive Computing, IEEE, vol. 2, pp. 30-36, 2003.
-
(2003)
Pervasive Computing, IEEE
, vol.2
, pp. 30-36
-
-
Pering, T.1
Sundar, M.2
Light, J.3
Want, R.4
-
7
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," International Journal of Human-Computer Studies, vol. 63, pp. 102-127, 2005.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
8
-
-
0016997596
-
Pictorial superiority effect
-
D. L. Nelson, Reed, U. S., & Walling, J. R. , "Pictorial superiority effect," Journal of Experimental Psychology: Human Learning & Memory, vol. 2, pp. 523-528, 1976.
-
(1976)
Journal of Experimental Psychology: Human Learning & Memory
, vol.2
, pp. 523-528
-
-
Nelson, D.L.1
Reed, U.S.2
Walling, J.R.3
-
9
-
-
0040231044
-
Foiling the Cracker: A Survey of, and Improvements to, Password Security
-
D. V. Klein, "Foiling the Cracker: A Survey of, and Improvements to, Password Security," Proceedings of the USENIX UNIX Security Workshop, (Portland), pp. 5-14, 1990.
-
(1990)
Proceedings of the USENIX UNIX Security Workshop, (Portland)
, pp. 5-14
-
-
Klein, D.V.1
-
10
-
-
14844314151
-
A Pl'N-entry method resilient against shoulder surfing
-
V. Roth, K. Richter, and R. Freidinger, "A Pl'N-entry method resilient against shoulder surfing," Proceedings of the 11th ACM conference on Computer and communications security, pp. 236-245, 2004.
-
(2004)
Proceedings of the 11th ACM conference on Computer and communications security
, pp. 236-245
-
-
Roth, V.1
Richter, K.2
Freidinger, R.3
-
11
-
-
36849032870
-
Reducing shoulder-surfing by using gaze-based password entry
-
M. Kumar, T. Garfinkel, D. Boneh, and T. Winograd, "Reducing shoulder-surfing by using gaze-based password entry," Proceedings of the 3rd symposium on Usable privacy and security. pp. 13-19,2007.
-
(2007)
Proceedings of the 3rd symposium on Usable privacy and security
, pp. 13-19
-
-
Kumar, M.1
Garfinkel, T.2
Boneh, D.3
Winograd, T.4
-
12
-
-
33846307457
-
Graphical Passwords: A Survey
-
Washington, DC, USA
-
X. Suo, Y. Zhu, and G. S. Owen, "Graphical Passwords: A Survey," IEEE Computer Society Washington, DC, USA, 2005, pp. 463-472.
-
(2005)
IEEE Computer Society
, pp. 463-472
-
-
Suo, X.1
Zhu, Y.2
Owen, G.S.3
-
13
-
-
34247167942
-
Design and evaluation of a shoulder-surfing resistant graphical password scheme
-
Venezia, Italy
-
S. Wiedenbeck, J. Waters, L. Sobrado, and J. C. Birget, "Design and evaluation of a shoulder-surfing resistant graphical password scheme," in Proceedings of the working conference on Advanced visual interfaces, Venezia, Italy, 2006, pp. 177-184.
-
(2006)
Proceedings of the working conference on Advanced visual interfaces
, pp. 177-184
-
-
Wiedenbeck, S.1
Waters, J.2
Sobrado, L.3
Birget, J.C.4
-
15
-
-
60349127556
-
-
quot;Positive Networks, the company, PhoneFactor, http://www.phoncfactor.com.
-
quot;Positive Networks, the company, PhoneFactor," http://www.phoncfactor.com.
-
-
-
-
16
-
-
17644379914
-
Security technologies go phishing
-
D. Geer, "Security technologies go phishing," Computer, vol. 38, pp. 18-21, 2005.
-
(2005)
Computer
, vol.38
, pp. 18-21
-
-
Geer, D.1
-
17
-
-
60349100581
-
-
quot;SiteKey at Bank of America, in http://www.bankofamerica. com/privacy/sitekey/.
-
quot;SiteKey at Bank of America," in http://www.bankofamerica. com/privacy/sitekey/.
-
-
-
-
18
-
-
36849075238
-
A second look at the usability of click-based graphical passwords
-
Pittsburgh, Pennsylvania
-
S. Chiasson, R. Biddle, and P. C. van Oorschot, "A second look at the usability of click-based graphical passwords," in Proceedings of the 3rd symposium on Usable privacy and securit. Pittsburgh, Pennsylvania 2007, pp. 1-12.
-
(2007)
Proceedings of the 3rd symposium on Usable privacy and securit
, pp. 1-12
-
-
Chiasson, S.1
Biddle, R.2
van Oorschot, P.C.3
-
19
-
-
60349089276
-
-
quot;Passfaces, the company, http://wvvw.passlaces.coni/.
-
quot;Passfaces, the company," http://wvvw.passlaces.coni/.
-
-
-
-
20
-
-
60349096544
-
-
quot;e-surveiller, in http://e-surveiller.com/: SurveilleTech LLC
-
quot;e-surveiller," in http://e-surveiller.com/: SurveilleTech LLC
-
-
-
-
21
-
-
60349092406
-
-
quot;RSA, the company, RSA mobile, in http://www.rsa.com/press- release.aspx?id=1506
-
quot;RSA, the company, RSA mobile," in http://www.rsa.com/press- release.aspx?id=1506
-
-
-
-
23
-
-
57349097387
-
Secure mobile computing via public terminals
-
Dublin, Ireland
-
R. Sharp, J. Scott, and A. Beresford, "Secure mobile computing via public terminals," in Proceedings of the International Conference on Pervasive, Dublin, Ireland, 2006.
-
(2006)
Proceedings of the International Conference on Pervasive
-
-
Sharp, R.1
Scott, J.2
Beresford, A.3
|