메뉴 건너뛰기




Volumn , Issue , 2008, Pages 24-34

Securing passfaces for description

Author keywords

Description; Graphical passwords; Passfaces

Indexed keywords

ALPHANUMERIC PASSWORDS; DESCRIPTION; GRAPHICAL PASSWORDS; PASSFACES; VISUAL SIMILARITIES;

EID: 65449144442     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1408664.1408668     Document Type: Conference Paper
Times cited : (31)

References (31)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • A. Adams and M. A. Sasse. Users are not the enemy. Commun. ACM, 42(12):40-46, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 2
    • 65449159600 scopus 로고    scopus 로고
    • United States Patent 5559961, Graphical Passwords, 1996
    • G. Blonder. United States Patent 5559961, Graphical Passwords, 1996.
    • Blonder, G.1
  • 5
    • 36849013132 scopus 로고    scopus 로고
    • Visual Code Recordal and Communication Thereof
    • International Patent PCT/GB1999/001688, 1999
    • J. Davies. Visual Code Recordal and Communication Thereof International Patent PCT/GB1999/001688, 1999.
    • Davies, J.1
  • 16
    • 33751168960 scopus 로고    scopus 로고
    • The usability of passphrases for authentication: An empirical field study
    • M. Keith, B. Shao, and P. J. Steinbart. The usability of passphrases for authentication: An empirical field study. Int. J. Hum.-Comput. Stud., 65(1):17-28, 2007.
    • (2007) Int. J. Hum.-Comput. Stud , vol.65 , Issue.1 , pp. 17-28
    • Keith, M.1    Shao, B.2    Steinbart, P.J.3
  • 18
    • 65449128678 scopus 로고    scopus 로고
    • Passfaces Corporation. The Science Behind Passfaces
    • Passfaces Corporation. The Science Behind Passfaces.
  • 19
    • 65449115896 scopus 로고    scopus 로고
    • Passfaces Corporation
    • Passfaces Corporation: http://www.passfaces.com.
  • 20
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' a human/computer interaction approach to usable and effective security
    • M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the 'weakest link' a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3):122-131, 2001.
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 21
    • 65449166643 scopus 로고    scopus 로고
    • Search Security.com - http://searchsecurity.techtarget.com/news/article/ 0,289142,sidl4-gci895483,00.html. Employees willing to share passwords with strangers (2003) last accessed 23/02/2008.
    • Search Security.com - http://searchsecurity.techtarget.com/news/article/ 0,289142,sidl4-gci895483,00.html. Employees willing to share passwords with strangers (2003) last accessed 23/02/2008.
  • 22
    • 65449189017 scopus 로고    scopus 로고
    • Searchsecurity.com - http://searchsecurity.techtarget.com/news/article/0, 289142,sidl4-gci902867,00.html. Most workers must remember 6 passwords or more (2003) last accessed 23/02/2008.
    • Searchsecurity.com - http://searchsecurity.techtarget.com/news/article/0, 289142,sidl4-gci902867,00.html. Most workers must remember 6 passwords or more (2003) last accessed 23/02/2008.
  • 23
    • 0039068594 scopus 로고
    • Authenticating users by word association
    • S. L. Smith. Authenticating users by word association. Comput. Secur., 6:464-470, 1987.
    • (1987) Comput. Secur , vol.6 , pp. 464-470
    • Smith, S.L.1
  • 26
    • 0003306197 scopus 로고    scopus 로고
    • An Evaluation of the Passface Personal Authentication System. Technical Report
    • London: Goldmsiths College University of London
    • T. Valentine. An Evaluation of the Passface Personal Authentication System. Technical Report. London: Goldmsiths College University of London., 1998.
    • (1998)
    • Valentine, T.1
  • 27
    • 0003308390 scopus 로고    scopus 로고
    • Memory for Passfaces after a long delay. Technical Report
    • London: Goldmsiths College University of London
    • T. Valentine. Memory for Passfaces after a long delay. Technical Report. London: Goldmsiths College University of London., 1998.
    • (1998)
    • Valentine, T.1
  • 28
    • 19944381937 scopus 로고    scopus 로고
    • PassPoints: Design and longitudinal evaluation of a graphical password system
    • S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. PassPoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum.-Comput. Stud., 63(1-2):102-127, 2005.
    • (2005) Int. J. Hum.-Comput. Stud , vol.63 , Issue.1-2 , pp. 102-127
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.-C.3    Brodskiy, A.4    Memon, N.5
  • 30
    • 0025545602 scopus 로고
    • Cognitive passwords: The key to easy access control
    • M. Zviran and W. J. Haga. Cognitive passwords: the key to easy access control. Comput. Secur., 9(9):723-736, 1990.
    • (1990) Comput. Secur , vol.9 , Issue.9 , pp. 723-736
    • Zviran, M.1    Haga, W.J.2
  • 31
    • 0003369812 scopus 로고
    • A comparison of password techniques for multilevel authentication mechanisms
    • M. Zviran and W. J. Haga. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal, 3(3), 1993.
    • (1993) The Computer Journal , vol.3 , Issue.3
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.