-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A. and Sasse, M.A. Users are not the enemy. CACM 42, 12 (1999), 41-46.
-
(1999)
CACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
19944393724
-
Semantic memory content in permastore: Fifty years of memory for Spanish learned in school
-
Bahrick, H.P. semantic memory content in permastore: Fifty years of memory for Spanish learned in school. Journal of Verbal Learning and Verbal Behavior 14 (1984), 1-24.
-
(1984)
Journal of Verbal Learning and Verbal Behavior
, vol.14
, pp. 1-24
-
-
Bahrick, H.P.1
-
3
-
-
0015550977
-
Searching for objects in real world scenes
-
Biederman, I., Glass, A.L. and Stacy, E.W. Searching for objects in real world scenes. Journal of Experimental Psychology 97 (1973), 22-27.
-
(1973)
Journal of Experimental Psychology
, vol.97
, pp. 22-27
-
-
Biederman, I.1
Glass, A.L.2
Stacy, E.W.3
-
4
-
-
7544230652
-
Robust discretization, with application to graphical passwords
-
accessed Jan. 17, 2005
-
Birget, J.C., Hong, d., Memon, N. Robust discretization, with application to graphical passwords. Cryptology ePrint Archive, http://eprint.iacr.org/2003/ 168, accessed Jan. 17, 2005.
-
Cryptology ePrint Archive
-
-
Birget, J.C.1
Hong, D.2
Memon, N.3
-
6
-
-
84925910612
-
Recall and recognition of words and pictures by adults and children
-
Borges, M.A., Stepnowsky, M.A., and Holt, L.H. Recall and recognition of words and pictures by adults and children. Bulletin of the Psychonomic Society 9, 2 (1977), 113-114.
-
(1977)
Bulletin of the Psychonomic Society
, vol.9
, Issue.2
, pp. 113-114
-
-
Borges, M.A.1
Stepnowsky, M.A.2
Holt, L.H.3
-
8
-
-
0026828718
-
Remembering pictures: Pleasure and arousal in memory
-
Bradley, M.M., Grenwald, M.K., Petry, M.C. and Lang, P.J. Remembering pictures: Pleasure and arousal in memory. Journal of Experimental Psychology 81, 2 (1992), 379-390.
-
(1992)
Journal of Experimental Psychology
, vol.81
, Issue.2
, pp. 379-390
-
-
Bradley, M.M.1
Grenwald, M.K.2
Petry, M.C.3
Lang, P.J.4
-
9
-
-
7744227917
-
Generating and remembering passwords
-
Brown, A.S., Bracken, E., Zoccoli, S. and Douglas, K. Generating and remembering passwords. Applied Cognitive Psychology 18 (2004), 641-651.
-
(2004)
Applied Cognitive Psychology
, vol.18
, pp. 641-651
-
-
Brown, A.S.1
Bracken, E.2
Zoccoli, S.3
Douglas, K.4
-
10
-
-
0003429117
-
Are passfaces more usable than passwords: A field trial investigation
-
Springer Verlag, (Bath, U.K., Sept. 8-12, 2000)
-
Brostoff, S. and Sasse, M.A. Are Passfaces more usable than passwords: A field trial investigation. In People and Computers XIV - Usability or Else: Proceedings of HCI 2000 (Bath, U.K., Sept. 8-12, 2000). Springer Verlag, 405- 424.
-
People and Computers XIV - Usability or Else: Proceedings of HCI 2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
11
-
-
0037699592
-
Usability and biometric verification at the ATM interface
-
(Fort Lauderdale, FL, USA, April 5-10), ACM Press, New York, NY
-
Coventry, L., De Angeli, A. and Johnson, G. Usability and biometric verification at the ATM interface. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'03) (Fort Lauderdale, FL, USA, April 5-10, 2003). ACM Press, New York, NY, 153-160.
-
(2003)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'03)
, pp. 153-160
-
-
Coventry, L.1
De Angeli, A.2
Johnson, G.3
-
12
-
-
85084162383
-
On user choice in graphical password schemes
-
San Diego, CA, USA, Aug. 9-13, accessed: Feb. 21, 2005
-
Davis, D. Monrose, F. and Reiter, M.K. On user choice in graphical password schemes. In Thirteenth Usenix Security Symposium (San Diego, CA, USA, Aug. 9-13, 2004). http://www.usenix.org/events/sec04/tech/davis.html, accessed: Feb. 21, 2005.
-
(2004)
Thirteenth Usenix Security Symposium
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
13
-
-
0037668484
-
VIP: A visual approach to user authentication
-
(Trento, Italy, May 22-24). ACM Press, New York, NY
-
De Angeli, A., Covernty, L., Cameron, D., Johnson, G.I. and Fischer, M. VIP: A visual approach to user authentication. In Proceedings of the Working Conference on Advanced Visual Interfaces (AVI 2002) (Trento, Italy, May 22-24, 2002). ACM Press, New York, NY, 316-323.
-
(2002)
Proceedings of the Working Conference on Advanced Visual Interfaces (AVI 2002)
, pp. 316-323
-
-
De Angeli, A.1
Covernty, L.2
Cameron, D.3
Johnson, G.I.4
Fischer, M.5
-
14
-
-
85084161493
-
Déjàvu: User study using images for authentication
-
(Denver, CO, USA, Aug. 14-17)., accessed: Feb. 20, 2005
-
Dhamija, R. and Perrig, A. Déjà Vu: User study using images for authentication. In Ninth Usenix Security Symposium (Denver, CO, USA, Aug. 14-17, 2000). http://www.usenix.org/publications/library/proceedings/sec2000/ dhamija.html, accessed: Feb. 20, 2005.
-
(2000)
Ninth Usenix Security Symposium
-
-
Dhamija, R.1
Perrig, A.2
-
15
-
-
19944395354
-
Security as experience and practice: Supporting everyday security
-
Talk given at the, July 7
-
Dourish, P. Security as experience and practice: Supporting everyday security. Talk given at the DIMACS Workshop on Usable Privacy and Security Software, July 7, 2004.
-
(2004)
DIMACS Workshop on Usable Privacy and Security Software
-
-
Dourish, P.1
-
16
-
-
0003532271
-
UNIX password security - Ten years later
-
Lecture Notes in Computer Science 435, Springer Verlag
-
Feldmeier, D.C. and Karn, P.R. UNIX password security - ten years later. In Advances in Cryptology - CRYPTO'89, Lecture Notes in Computer Science 435, Springer Verlag (1990), 44-63.
-
(1990)
Advances in Cryptology - CRYPTO'89
, pp. 44-63
-
-
Feldmeier, D.C.1
Karn, P.R.2
-
17
-
-
46649087024
-
The information capacity of the human motor system in controlling amplitude of movement
-
Fitts, P.M. The information capacity of the human motor system in controlling amplitude of movement. Journal of Experimental Psychology 47 (1954), 381-391.
-
(1954)
Journal of Experimental Psychology
, vol.47
, pp. 381-391
-
-
Fitts, P.M.1
-
19
-
-
0002326595
-
Biometric identification
-
Jain, A., Hong, L. and Pankanti, S. Biometric identification. CACM 43, 2 (2000), 91-98.
-
(2000)
CACM
, vol.43
, Issue.2
, pp. 91-98
-
-
Jain, A.1
Hong, L.2
Pankanti, S.3
-
20
-
-
77953781532
-
A survey of, and improvement to, password security
-
(Portland, OR, USA, Aug. 27- 28)
-
Klein, D. A survey of, and improvement to, password security. In UNIX Security Workshop II Proceedings, Tenth Usenix Security Symposium (Portland, OR, USA, Aug. 27- 28, 1990), 83-86.
-
(1990)
UNIX Security Workshop II Proceedings, Tenth Usenix Security Symposium
, pp. 83-86
-
-
Klein, D.1
-
22
-
-
0018543411
-
Password security; A case study
-
Morris, R. and Thompson, K. Password security; A case study. CACM 22 (1979), 594-597.
-
(1979)
CACM
, vol.22
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
23
-
-
19944389068
-
Picture superiority effect
-
Nelson, D.L., Reed, U.S., and Walling, J.R. Picture superiority effect. Journal of Experimental Psychology: Human Learning and Memory 3 (1977), 485-497.
-
(1977)
Journal of Experimental Psychology: Human Learning and Memory
, vol.3
, pp. 485-497
-
-
Nelson, D.L.1
Reed, U.S.2
Walling, J.R.3
-
24
-
-
0003571142
-
The design of everyday things
-
New York, NY
-
Norman, D.A. The Design of Everyday Things. Basic Books, New York, NY, 1988.
-
(1988)
Basic Books
-
-
Norman, D.A.1
-
25
-
-
84869031038
-
HCI and security systems
-
(Vienna, Austria, April 24-29). ACM Press, New York, NY
-
Patrick, A.S., Long, A.C. and Flinn, S. HCI and security systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'04) (Vienna, Austria, April 24-29, 2004). ACM Press, New York, NY, 1056-1057.
-
(2004)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'04)
, pp. 1056-1057
-
-
Patrick, A.S.1
Long, A.C.2
Flinn, S.3
-
26
-
-
80054092539
-
Why are pictures easier to recall than words?
-
Paivio, A., Rogers, T.B. and Smythe, P.C. Why are pictures easier to recall than words? Psychonomic Science 11, 4 (1976), 137-138.
-
(1976)
Psychonomic Science
, vol.11
, Issue.4
, pp. 137-138
-
-
Paivio, A.1
Rogers, T.B.2
Smythe, P.C.3
-
27
-
-
33745136298
-
-
Real User Corporation. Accessed Dec. 2, 2002
-
Real User Corporation. The Science Behind Passfaces. http://www. realusers.com. Accessed Dec. 2, 2002.
-
The Science behind Passfaces
-
-
-
28
-
-
33751577351
-
Analysis of rehearsal processes in free recall
-
Rundus, D.J. Analysis of rehearsal processes in free recall. Journal of Experimental Psychology 89 (1971), 63-77.
-
(1971)
Journal of Experimental Psychology
, vol.89
, pp. 63-77
-
-
Rundus, D.J.1
-
29
-
-
0035387175
-
Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
-
Sasse, M.A., Brostoff, S. and Weirich, D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technical Journal 19 (2001), 122-131.
-
(2001)
BT Technical Journal
, vol.19
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
32
-
-
19944375977
-
Passwords you'll never forget, but can't recall
-
(Vienna, Austria, April 24-29 ). ACM Press, New York, NY
-
Weinshall, D. and Kirkpatrick, S. Passwords you'll never forget, but can't recall. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'04) (Vienna, Austria, April 24-29, 2004). ACM Press, New York, NY, 1399-1402.
-
(2004)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'04)
, pp. 1399-1402
-
-
Weinshall, D.1
Kirkpatrick, S.2
-
33
-
-
35248891741
-
Authentication using graphical passwords: Basic results
-
in press
-
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A. and Memon, N. Authentication using graphical passwords: Basic Results. Proc. Human-Computer Interaction International 2005, in press.
-
(2005)
Proc. Human-computer Interaction International
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
34
-
-
19944381937
-
Passpoints: Design and longitudinal evaluation of a graphical password system
-
Special Issue on HCI Research in Privacy and Security, in press
-
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A. and Memon, N. PassPoints: Design and longitudinal evaluation of a graphical password system. Special Issue on HCI Research in Privacy and Security, International Journal of Human-Computer Studies, in press.
-
International Journal of Human-computer Studies
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
35
-
-
1842537957
-
The psychology and neuroscience of forgetting
-
Wixted, T.J. The psychology and neuroscience of forgetting. Annual Review of Psychology 55 (2004), 235-26.
-
(2004)
Annual Review of Psychology
, vol.55
, pp. 235-326
-
-
Wixted, T.J.1
|