-
1
-
-
33748107711
-
Robust Discretization, with an Application to Graphical Passwords
-
J.C. Birget, D. Hong, and N. Memon. Robust Discretization, with an Application to Graphical Passwords. IEEE Transactions on Information Forensics and Security, 1:395-399, 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, pp. 395-399
-
-
Birget, J.C.1
Hong, D.2
Memon, N.3
-
2
-
-
12244260624
-
Graphical Passwords
-
United States Patent 5559961
-
G. Blonder. Graphical Passwords. United States Patent 5559961, 1996.
-
(1996)
-
-
Blonder, G.1
-
3
-
-
60649113368
-
-
Ian Britton. http://www.freefoto.com, site accessed Feb. 2, 2007.
-
Ian Britton. http://www.freefoto.com, site accessed Feb. 2, 2007.
-
-
-
-
4
-
-
84900557334
-
-
S. Chiasson, A. Forget, P.C. van Oorschot, and R. Biddle. Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. In HCI, 2008.
-
S. Chiasson, A. Forget, P.C. van Oorschot, and R. Biddle. Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. In HCI, 2008.
-
-
-
-
5
-
-
60349118061
-
A Second Look at the Usability of Click-Based Graphical Passwords
-
S. Chiasson, P.C. van Oorschot, and R. Biddle. A Second Look at the Usability of Click-Based Graphical Passwords. In SOUPS, 2007.
-
(2007)
SOUPS
-
-
Chiasson, S.1
van Oorschot, P.C.2
Biddle, R.3
-
6
-
-
77949497300
-
Graphical Password Authentication Using Cued Click Points
-
S. Chiasson, P.C. van Oorschot, and R. Biddle. Graphical Password Authentication Using Cued Click Points. In ESORICS, 2007.
-
(2007)
ESORICS
-
-
Chiasson, S.1
van Oorschot, P.C.2
Biddle, R.3
-
7
-
-
0036565814
-
Mean Shift: A Robust Approach Toward Feature Space Analysis
-
D. Comaniciu and P. Meer. Mean Shift: A Robust Approach Toward Feature Space Analysis. IEEE Trans. PAMI, 24(5):603-619, 2002.
-
(2002)
IEEE Trans. PAMI
, vol.24
, Issue.5
, pp. 603-619
-
-
Comaniciu, D.1
Meer, P.2
-
8
-
-
84981263306
-
The Magical Number 4 in Short-Term Memory: A Reconsideration of Mental Storage Capacity
-
N. Cowan. The Magical Number 4 in Short-Term Memory: A Reconsideration of Mental Storage Capacity. Behavioral and Brain Sciences, 24:87-185, 2000.
-
(2000)
Behavioral and Brain Sciences
, vol.24
, pp. 87-185
-
-
Cowan, N.1
-
10
-
-
63549135258
-
Modeling User Choice in the PassPoints Graphical Password Scheme
-
A. Dirik, N. Memon, and J.-C. Birget. Modeling User Choice in the PassPoints Graphical Password Scheme. In SOUPS, 2007.
-
(2007)
SOUPS
-
-
Dirik, A.1
Memon, N.2
Birget, J.-C.3
-
13
-
-
60649110189
-
-
SFR IT-Engineering. The grafical login solution for your pocket pc - viskey. http://www.sfr-software.de/cms/EN/pocketpc/viskey/index.html, site accessed Sept. 18, 2008.
-
SFR IT-Engineering. The grafical login solution for your pocket pc - viskey. http://www.sfr-software.de/cms/EN/pocketpc/viskey/index.html, site accessed Sept. 18, 2008.
-
-
-
-
14
-
-
0035286497
-
Computational Modeling of Visual Attention
-
Mar
-
L. Itti and C. Koch. Computational Modeling of Visual Attention. Nature Reviews Neuroscience, 2(3):194-203, Mar 2001.
-
(2001)
Nature Reviews Neuroscience
, vol.2
, Issue.3
, pp. 194-203
-
-
Itti, L.1
Koch, C.2
-
15
-
-
0032204063
-
-
L. Itti, C. Koch, and E. Niebur. A Model of Saliency-Based Visual Attention for Rapid Scene Analysis. IEEE Trans. PAMI, 20(11):1254-1259, Nov 1998.
-
L. Itti, C. Koch, and E. Niebur. A Model of Saliency-Based Visual Attention for Rapid Scene Analysis. IEEE Trans. PAMI, 20(11):1254-1259, Nov 1998.
-
-
-
-
16
-
-
26844503950
-
Picture Password: A Visual Login Technique for Mobile Devices
-
NIS-TIR7030, 2003
-
W. Jansen, S. Gavrilla, V. Korolev, R. Ayers, and Swanstrom R. Picture Password: A Visual Login Technique for Mobile Devices. NIST Report - NIS-TIR7030, 2003.
-
NIST Report
-
-
Jansen, W.1
Gavrilla, S.2
Korolev, V.3
Ayers, R.4
Swanstrom, R.5
-
17
-
-
85084161999
-
The Design and Analysis of Graphical Passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The Design and Analysis of Graphical Passwords. In USENIX Security, 1999.
-
(1999)
USENIX Security
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
18
-
-
33745177230
-
-
School of Computer Science & Software Engineering, The University of Western Australia
-
P. D. Kovesi. MATLAB and Octave Functions for Computer Vision and Image Processing. School of Computer Science & Software Engineering, The University of Western Australia. http://www.csse.uwa.edu.au/~pk/research/ matlabfns/.
-
MATLAB and Octave Functions for Computer Vision and Image Processing
-
-
Kovesi, P.D.1
-
20
-
-
39149113346
-
Graphical Passwords
-
L. Cranor and S. Garfinkel, editors, chapter 9, O'Reilly
-
F. Monrose and M. K. Reiter. Graphical Passwords. In L. Cranor and S. Garfinkel, editors, Security and Usability, chapter 9, pages 147-164. O'Reilly, 2005.
-
(2005)
Security and Usability
, pp. 147-164
-
-
Monrose, F.1
Reiter, M.K.2
-
21
-
-
9644289372
-
Modeling the Influence of Task on Attention
-
Vidhya Navalpakkam and Laurent Itti. Modeling the Influence of Task on Attention. Vison Research, 45:205-231, 2005.
-
(2005)
Vison Research
, vol.45
, pp. 205-231
-
-
Navalpakkam, V.1
Itti, L.2
-
22
-
-
4243110339
-
Top Down Control of Visual Attention in Object Detection
-
A. Oliva, A. Torralba, M. Castelhano, and J. Henderson. Top Down Control of Visual Attention in Object Detection. Journal of Vision, 3(9):253-256, 2003.
-
(2003)
Journal of Vision
, vol.3
, Issue.9
, pp. 253-256
-
-
Oliva, A.1
Torralba, A.2
Castelhano, M.3
Henderson, J.4
-
23
-
-
14044256883
-
Empirical Validation of the Saliency-based Model of Visual Attention
-
N. Ouerhani, R. von Wartburg, H. Hugli, and R. Muri. Empirical Validation of the Saliency-based Model of Visual Attention. Electronic Letters on Computer Vision and Image Analysis, 3(1):13-24, 2004.
-
(2004)
Electronic Letters on Computer Vision and Image Analysis
, vol.3
, Issue.1
, pp. 13-24
-
-
Ouerhani, N.1
von Wartburg, R.2
Hugli, H.3
Muri, R.4
-
24
-
-
60649096640
-
-
Passlogix. http://www.passlogix.com, site accessed Feb. 2, 2007.
-
Passlogix. http://www.passlogix.com, site accessed Feb. 2, 2007.
-
-
-
-
27
-
-
85049042638
-
Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords
-
J. Thorpe and P. C. van Oorschot. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In USENIX Security, 2007.
-
(2007)
USENIX Security
-
-
Thorpe, J.1
van Oorschot, P.C.2
-
28
-
-
39149106769
-
On Predictive Models and User-Drawn Graphical Passwords
-
November
-
P.C. van Oorschot and J. Thorpe. On Predictive Models and User-Drawn Graphical Passwords. ACM TISSEC, 10(4):1-33, November 2007.
-
(2007)
ACM TISSEC
, vol.10
, Issue.4
, pp. 1-33
-
-
van Oorschot, P.C.1
Thorpe, J.2
-
29
-
-
33750684017
-
Special Issue: Modeling Attention to Salient Proto-objects
-
Dirk Walther and Christof Koch. 2006 Special Issue: Modeling Attention to Salient Proto-objects. Neural Network, 19(9):1395-1407, 2006.
-
(2006)
Neural Network
, vol.19
, Issue.9
, pp. 1395-1407
-
-
Walther, D.1
Koch, C.2
-
30
-
-
19944381937
-
PassPoints: Design and Longitudinal Evaluation of a Graphical Password System
-
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. PassPoints: Design and Longitudinal Evaluation of a Graphical Password System. Int. J. Hum.-Comput. Stud., 63(1-2):102-127, 2005.
-
(2005)
Int. J. Hum.-Comput. Stud
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.3
Brodskiy, A.4
Memon, N.5
-
31
-
-
35248891741
-
Authentication Using Graphical Passwords: Basic Results
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication Using Graphical Passwords: Basic Results. In HCII, 2005.
-
(2005)
HCII
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
32
-
-
60649116908
-
Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. In SOUPS, pages 1-12, 2005.
-
(2005)
SOUPS
, pp. 1-12
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
33
-
-
84864888849
-
Guided Search 2.0: A Revised Model of Visual Search
-
J.M. Wolfe. Guided Search 2.0: A Revised Model of Visual Search. Psychonomic Bulletin and Review, 1(2):202-238, 1994.
-
(1994)
Psychonomic Bulletin and Review
, vol.1
, Issue.2
, pp. 202-238
-
-
Wolfe, J.M.1
|