메뉴 건너뛰기




Volumn , Issue , 2008, Pages 111-120

On purely automated attacks and click-based graphical passwords

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; COMPUTATIONAL METHODS; COMPUTER APPLICATIONS; SECURITY SYSTEMS;

EID: 60649098534     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.18     Document Type: Conference Paper
Times cited : (41)

References (33)
  • 2
    • 12244260624 scopus 로고    scopus 로고
    • Graphical Passwords
    • United States Patent 5559961
    • G. Blonder. Graphical Passwords. United States Patent 5559961, 1996.
    • (1996)
    • Blonder, G.1
  • 3
    • 60649113368 scopus 로고    scopus 로고
    • Ian Britton. http://www.freefoto.com, site accessed Feb. 2, 2007.
    • Ian Britton. http://www.freefoto.com, site accessed Feb. 2, 2007.
  • 4
    • 84900557334 scopus 로고    scopus 로고
    • S. Chiasson, A. Forget, P.C. van Oorschot, and R. Biddle. Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. In HCI, 2008.
    • S. Chiasson, A. Forget, P.C. van Oorschot, and R. Biddle. Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. In HCI, 2008.
  • 5
    • 60349118061 scopus 로고    scopus 로고
    • A Second Look at the Usability of Click-Based Graphical Passwords
    • S. Chiasson, P.C. van Oorschot, and R. Biddle. A Second Look at the Usability of Click-Based Graphical Passwords. In SOUPS, 2007.
    • (2007) SOUPS
    • Chiasson, S.1    van Oorschot, P.C.2    Biddle, R.3
  • 6
    • 77949497300 scopus 로고    scopus 로고
    • Graphical Password Authentication Using Cued Click Points
    • S. Chiasson, P.C. van Oorschot, and R. Biddle. Graphical Password Authentication Using Cued Click Points. In ESORICS, 2007.
    • (2007) ESORICS
    • Chiasson, S.1    van Oorschot, P.C.2    Biddle, R.3
  • 7
    • 0036565814 scopus 로고    scopus 로고
    • Mean Shift: A Robust Approach Toward Feature Space Analysis
    • D. Comaniciu and P. Meer. Mean Shift: A Robust Approach Toward Feature Space Analysis. IEEE Trans. PAMI, 24(5):603-619, 2002.
    • (2002) IEEE Trans. PAMI , vol.24 , Issue.5 , pp. 603-619
    • Comaniciu, D.1    Meer, P.2
  • 8
    • 84981263306 scopus 로고    scopus 로고
    • The Magical Number 4 in Short-Term Memory: A Reconsideration of Mental Storage Capacity
    • N. Cowan. The Magical Number 4 in Short-Term Memory: A Reconsideration of Mental Storage Capacity. Behavioral and Brain Sciences, 24:87-185, 2000.
    • (2000) Behavioral and Brain Sciences , vol.24 , pp. 87-185
    • Cowan, N.1
  • 10
    • 63549135258 scopus 로고    scopus 로고
    • Modeling User Choice in the PassPoints Graphical Password Scheme
    • A. Dirik, N. Memon, and J.-C. Birget. Modeling User Choice in the PassPoints Graphical Password Scheme. In SOUPS, 2007.
    • (2007) SOUPS
    • Dirik, A.1    Memon, N.2    Birget, J.-C.3
  • 13
    • 60649110189 scopus 로고    scopus 로고
    • SFR IT-Engineering. The grafical login solution for your pocket pc - viskey. http://www.sfr-software.de/cms/EN/pocketpc/viskey/index.html, site accessed Sept. 18, 2008.
    • SFR IT-Engineering. The grafical login solution for your pocket pc - viskey. http://www.sfr-software.de/cms/EN/pocketpc/viskey/index.html, site accessed Sept. 18, 2008.
  • 14
    • 0035286497 scopus 로고    scopus 로고
    • Computational Modeling of Visual Attention
    • Mar
    • L. Itti and C. Koch. Computational Modeling of Visual Attention. Nature Reviews Neuroscience, 2(3):194-203, Mar 2001.
    • (2001) Nature Reviews Neuroscience , vol.2 , Issue.3 , pp. 194-203
    • Itti, L.1    Koch, C.2
  • 15
    • 0032204063 scopus 로고    scopus 로고
    • L. Itti, C. Koch, and E. Niebur. A Model of Saliency-Based Visual Attention for Rapid Scene Analysis. IEEE Trans. PAMI, 20(11):1254-1259, Nov 1998.
    • L. Itti, C. Koch, and E. Niebur. A Model of Saliency-Based Visual Attention for Rapid Scene Analysis. IEEE Trans. PAMI, 20(11):1254-1259, Nov 1998.
  • 18
  • 20
    • 39149113346 scopus 로고    scopus 로고
    • Graphical Passwords
    • L. Cranor and S. Garfinkel, editors, chapter 9, O'Reilly
    • F. Monrose and M. K. Reiter. Graphical Passwords. In L. Cranor and S. Garfinkel, editors, Security and Usability, chapter 9, pages 147-164. O'Reilly, 2005.
    • (2005) Security and Usability , pp. 147-164
    • Monrose, F.1    Reiter, M.K.2
  • 21
    • 9644289372 scopus 로고    scopus 로고
    • Modeling the Influence of Task on Attention
    • Vidhya Navalpakkam and Laurent Itti. Modeling the Influence of Task on Attention. Vison Research, 45:205-231, 2005.
    • (2005) Vison Research , vol.45 , pp. 205-231
    • Navalpakkam, V.1    Itti, L.2
  • 22
    • 4243110339 scopus 로고    scopus 로고
    • Top Down Control of Visual Attention in Object Detection
    • A. Oliva, A. Torralba, M. Castelhano, and J. Henderson. Top Down Control of Visual Attention in Object Detection. Journal of Vision, 3(9):253-256, 2003.
    • (2003) Journal of Vision , vol.3 , Issue.9 , pp. 253-256
    • Oliva, A.1    Torralba, A.2    Castelhano, M.3    Henderson, J.4
  • 24
    • 60649096640 scopus 로고    scopus 로고
    • Passlogix. http://www.passlogix.com, site accessed Feb. 2, 2007.
    • Passlogix. http://www.passlogix.com, site accessed Feb. 2, 2007.
  • 26
    • 33846307457 scopus 로고    scopus 로고
    • Graphical Passwords: A Survey
    • Xiaoyuan Suo, Ying Zhu, and G. Scott Owen. Graphical Passwords: A Survey. In ACSAC, 2005.
    • (2005) ACSAC
    • Suo, X.1    Zhu, Y.2    Scott Owen, G.3
  • 27
    • 85049042638 scopus 로고    scopus 로고
    • Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords
    • J. Thorpe and P. C. van Oorschot. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In USENIX Security, 2007.
    • (2007) USENIX Security
    • Thorpe, J.1    van Oorschot, P.C.2
  • 28
    • 39149106769 scopus 로고    scopus 로고
    • On Predictive Models and User-Drawn Graphical Passwords
    • November
    • P.C. van Oorschot and J. Thorpe. On Predictive Models and User-Drawn Graphical Passwords. ACM TISSEC, 10(4):1-33, November 2007.
    • (2007) ACM TISSEC , vol.10 , Issue.4 , pp. 1-33
    • van Oorschot, P.C.1    Thorpe, J.2
  • 29
    • 33750684017 scopus 로고    scopus 로고
    • Special Issue: Modeling Attention to Salient Proto-objects
    • Dirk Walther and Christof Koch. 2006 Special Issue: Modeling Attention to Salient Proto-objects. Neural Network, 19(9):1395-1407, 2006.
    • (2006) Neural Network , vol.19 , Issue.9 , pp. 1395-1407
    • Walther, D.1    Koch, C.2
  • 30
    • 19944381937 scopus 로고    scopus 로고
    • PassPoints: Design and Longitudinal Evaluation of a Graphical Password System
    • S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. PassPoints: Design and Longitudinal Evaluation of a Graphical Password System. Int. J. Hum.-Comput. Stud., 63(1-2):102-127, 2005.
    • (2005) Int. J. Hum.-Comput. Stud , vol.63 , Issue.1-2 , pp. 102-127
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.3    Brodskiy, A.4    Memon, N.5
  • 32
    • 60649116908 scopus 로고    scopus 로고
    • Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice
    • S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. In SOUPS, pages 1-12, 2005.
    • (2005) SOUPS , pp. 1-12
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.-C.3    Brodskiy, A.4    Memon, N.5
  • 33
    • 84864888849 scopus 로고
    • Guided Search 2.0: A Revised Model of Visual Search
    • J.M. Wolfe. Guided Search 2.0: A Revised Model of Visual Search. Psychonomic Bulletin and Review, 1(2):202-238, 1994.
    • (1994) Psychonomic Bulletin and Review , vol.1 , Issue.2 , pp. 202-238
    • Wolfe, J.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.