메뉴 건너뛰기




Volumn 93, Issue , 2005, Pages 1-12

Authentication using graphical passwords: Effects of tolerance and image choice

Author keywords

Authentication; Graphical passwords; Password images; Tolerance

Indexed keywords

ALPHANUMERIC PASSWORDS; GRAPHICAL PASSWORD; GRAPHICAL PASSWORDS; HUMAN FACTORS; HUMAN USERS; IMAGE STUDY; MARGIN OF ERROR; PASS POINT; PASSWORD SYSTEMS; USER PERFORMANCE;

EID: 60649116908     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1073001.1073002     Document Type: Conference Paper
Times cited : (127)

References (35)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Adams, A. and Sasse, M.A. Users are not the enemy. CACM 42, 12 (1999), 41-46.
    • (1999) CACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 2
    • 19944393724 scopus 로고
    • Semantic memory content in permastore: Fifty years of memory for Spanish learned in school
    • Bahrick, H.P. semantic memory content in permastore: Fifty years of memory for Spanish learned in school. Journal of Verbal Learning and Verbal Behavior 14 (1984), 1-24.
    • (1984) Journal of Verbal Learning and Verbal Behavior , vol.14 , pp. 1-24
    • Bahrick, H.P.1
  • 4
    • 7544230652 scopus 로고    scopus 로고
    • Robust discretization, with application to graphical passwords
    • accessed Jan. 17, 2005
    • Birget, J.C., Hong, d., Memon, N. Robust discretization, with application to graphical passwords. Cryptology ePrint Archive, http://eprint.iacr.org/2003/ 168, accessed Jan. 17, 2005.
    • Cryptology ePrint Archive
    • Birget, J.C.1    Hong, D.2    Memon, N.3
  • 6
  • 10
    • 0003429117 scopus 로고    scopus 로고
    • Are passfaces more usable than passwords: A field trial investigation
    • Springer Verlag, (Bath, U.K., Sept. 8-12, 2000)
    • Brostoff, S. and Sasse, M.A. Are Passfaces more usable than passwords: A field trial investigation. In People and Computers XIV - Usability or Else: Proceedings of HCI 2000 (Bath, U.K., Sept. 8-12, 2000). Springer Verlag, 405- 424.
    • People and Computers XIV - Usability or Else: Proceedings of HCI 2000 , pp. 405-424
    • Brostoff, S.1    Sasse, M.A.2
  • 12
    • 85084162383 scopus 로고    scopus 로고
    • On user choice in graphical password schemes
    • San Diego, CA, USA, Aug. 9-13, accessed: Feb. 21, 2005
    • Davis, D. Monrose, F. and Reiter, M.K. On user choice in graphical password schemes. In Thirteenth Usenix Security Symposium (San Diego, CA, USA, Aug. 9-13, 2004). http://www.usenix.org/events/sec04/tech/davis.html, accessed: Feb. 21, 2005.
    • (2004) Thirteenth Usenix Security Symposium
    • Davis, D.1    Monrose, F.2    Reiter, M.K.3
  • 14
    • 85084161493 scopus 로고    scopus 로고
    • Déjàvu: User study using images for authentication
    • (Denver, CO, USA, Aug. 14-17)., accessed: Feb. 20, 2005
    • Dhamija, R. and Perrig, A. Déjà Vu: User study using images for authentication. In Ninth Usenix Security Symposium (Denver, CO, USA, Aug. 14-17, 2000). http://www.usenix.org/publications/library/proceedings/sec2000/ dhamija.html, accessed: Feb. 20, 2005.
    • (2000) Ninth Usenix Security Symposium
    • Dhamija, R.1    Perrig, A.2
  • 15
    • 19944395354 scopus 로고    scopus 로고
    • Security as experience and practice: Supporting everyday security
    • Talk given at the, July 7
    • Dourish, P. Security as experience and practice: Supporting everyday security. Talk given at the DIMACS Workshop on Usable Privacy and Security Software, July 7, 2004.
    • (2004) DIMACS Workshop on Usable Privacy and Security Software
    • Dourish, P.1
  • 16
    • 0003532271 scopus 로고
    • UNIX password security - Ten years later
    • Lecture Notes in Computer Science 435, Springer Verlag
    • Feldmeier, D.C. and Karn, P.R. UNIX password security - ten years later. In Advances in Cryptology - CRYPTO'89, Lecture Notes in Computer Science 435, Springer Verlag (1990), 44-63.
    • (1990) Advances in Cryptology - CRYPTO'89 , pp. 44-63
    • Feldmeier, D.C.1    Karn, P.R.2
  • 17
    • 46649087024 scopus 로고
    • The information capacity of the human motor system in controlling amplitude of movement
    • Fitts, P.M. The information capacity of the human motor system in controlling amplitude of movement. Journal of Experimental Psychology 47 (1954), 381-391.
    • (1954) Journal of Experimental Psychology , vol.47 , pp. 381-391
    • Fitts, P.M.1
  • 19
    • 0002326595 scopus 로고    scopus 로고
    • Biometric identification
    • Jain, A., Hong, L. and Pankanti, S. Biometric identification. CACM 43, 2 (2000), 91-98.
    • (2000) CACM , vol.43 , Issue.2 , pp. 91-98
    • Jain, A.1    Hong, L.2    Pankanti, S.3
  • 22
    • 0018543411 scopus 로고
    • Password security; A case study
    • Morris, R. and Thompson, K. Password security; A case study. CACM 22 (1979), 594-597.
    • (1979) CACM , vol.22 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 24
    • 0003571142 scopus 로고
    • The design of everyday things
    • New York, NY
    • Norman, D.A. The Design of Everyday Things. Basic Books, New York, NY, 1988.
    • (1988) Basic Books
    • Norman, D.A.1
  • 26
    • 80054092539 scopus 로고
    • Why are pictures easier to recall than words?
    • Paivio, A., Rogers, T.B. and Smythe, P.C. Why are pictures easier to recall than words? Psychonomic Science 11, 4 (1976), 137-138.
    • (1976) Psychonomic Science , vol.11 , Issue.4 , pp. 137-138
    • Paivio, A.1    Rogers, T.B.2    Smythe, P.C.3
  • 27
    • 33745136298 scopus 로고    scopus 로고
    • Real User Corporation. Accessed Dec. 2, 2002
    • Real User Corporation. The Science Behind Passfaces. http://www. realusers.com. Accessed Dec. 2, 2002.
    • The Science behind Passfaces
  • 28
    • 33751577351 scopus 로고
    • Analysis of rehearsal processes in free recall
    • Rundus, D.J. Analysis of rehearsal processes in free recall. Journal of Experimental Psychology 89 (1971), 63-77.
    • (1971) Journal of Experimental Psychology , vol.89 , pp. 63-77
    • Rundus, D.J.1
  • 29
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • Sasse, M.A., Brostoff, S. and Weirich, D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technical Journal 19 (2001), 122-131.
    • (2001) BT Technical Journal , vol.19 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 34
    • 19944381937 scopus 로고    scopus 로고
    • Passpoints: Design and longitudinal evaluation of a graphical password system
    • Special Issue on HCI Research in Privacy and Security, in press
    • Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A. and Memon, N. PassPoints: Design and longitudinal evaluation of a graphical password system. Special Issue on HCI Research in Privacy and Security, International Journal of Human-Computer Studies, in press.
    • International Journal of Human-computer Studies
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.C.3    Brodskiy, A.4    Memon, N.5
  • 35
    • 1842537957 scopus 로고    scopus 로고
    • The psychology and neuroscience of forgetting
    • Wixted, T.J. The psychology and neuroscience of forgetting. Annual Review of Psychology 55 (2004), 235-26.
    • (2004) Annual Review of Psychology , vol.55 , pp. 235-326
    • Wixted, T.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.