-
1
-
-
0043232732
-
Users are not the enemy
-
A. Adams and M. A. Sasse. Users are not the enemy. Commun. ACM, 42(12):40-46, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
65449159600
-
-
United States Patent 5559961, Graphical Passwords, 1996
-
G. Blonder. United States Patent 5559961, Graphical Passwords, 1996.
-
-
-
Blonder, G.1
-
4
-
-
80052801173
-
A usability study and critique of two password managers
-
Berkeley, CA, USA, USENIX Association
-
S. Chiasson, P. C. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 1-1, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium
, pp. 1-1
-
-
Chiasson, S.1
van Oorschot, P.C.2
Biddle, R.3
-
5
-
-
36849013132
-
Visual Code Recordal and Communication Thereof
-
International Patent PCT/GB1999/001688, 1999
-
J. Davies. Visual Code Recordal and Communication Thereof International Patent PCT/GB1999/001688, 1999.
-
-
-
Davies, J.1
-
6
-
-
85084162383
-
On user choice in graphical password schemes
-
Berkeley, CA, USA, USENIX Association
-
D. Davis, F. Monrose, and M. K. Reiter. On user choice in graphical password schemes. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pages 11-11, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium
, pp. 11-11
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
7
-
-
85084162383
-
On user choice in graphical password schemes
-
Berkeley, CA, USA, USENIX Association
-
D. Davis, F. Monrose, and M. K. Reiter. On user choice in graphical password schemes. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pages 11-11, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium
, pp. 11-11
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
8
-
-
9944261689
-
Usability and user authentication: Pictorial passwords vs. pin
-
Taylor & Francis. London
-
A. De Angeli, L. Coventry, G. Johnson, and M. Coutts. Usability and user authentication: Pictorial passwords vs. pin. In McCabe, P.T. (Ed.), Contemporary Ergonomics 2003., pages 253-258. Taylor & Francis. London, 2003.
-
(2003)
McCabe, P.T. (Ed.), Contemporary Ergonomics 2003
, pp. 253-258
-
-
De Angeli, A.1
Coventry, L.2
Johnson, G.3
Coutts, M.4
-
9
-
-
85084161493
-
Déjà Vu: A user study using images for authentication
-
Berkeley, CA, USA, USENIX Association
-
R. Dhamija and A. Perrig. Déjà Vu: a user study using images for authentication. In SSYM'00: Proceedings of the 9th conference on USENIX Security Symposium, pages 4-4, Berkeley, CA, USA, 2000. USENIX Association.
-
(2000)
SSYM'00: Proceedings of the 9th conference on USENIX Security Symposium
, pp. 4-4
-
-
Dhamija, R.1
Perrig, A.2
-
10
-
-
36848999302
-
Modeling user choice in the PassPoints graphical password scheme
-
New York, NY, USA, ACM
-
A. E. Dirik, N. Memon, and J.-C. Birget. Modeling user choice in the PassPoints graphical password scheme. In SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security, pages 20-28, New York, NY, USA, 2007. ACM.
-
(2007)
SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security
, pp. 20-28
-
-
Dirik, A.E.1
Memon, N.2
Birget, J.-C.3
-
12
-
-
36849034425
-
Is FacePIN secure and usable?
-
New York, NY, USA, ACM
-
P. Dunphy and J. Yan. Is FacePIN secure and usable? In SOUPS '07: Proceedings of the 3rd symposium, on Usable privacy and security, pages 165-166, New York, NY, USA, 2007. ACM.
-
(2007)
SOUPS '07: Proceedings of the 3rd symposium, on Usable privacy and security
, pp. 165-166
-
-
Dunphy, P.1
Yan, J.2
-
14
-
-
0000042937
-
Early Vocabulary growth: Relation to Language Input and Gender
-
J. Huttenlocher, W. Haight, A. Bryk, M. Seltzer, and T. Lyons. Early Vocabulary growth: Relation to Language Input and Gender. In Developmental Psychology, volume 27, pages 236-248.
-
Developmental Psychology
, vol.27
, pp. 236-248
-
-
Huttenlocher, J.1
Haight, W.2
Bryk, A.3
Seltzer, M.4
Lyons, T.5
-
15
-
-
85084161999
-
The design and analysis of graphical passwords
-
Berkeley, CA, USA, USENIX Association
-
Ian Jermyn and Alain Mayer and Fabian Monrose and Michael K. Reiter and Aviel D. Rubin. The design and analysis of graphical passwords. In SSYM'99: Proceedings of the 8th Conference on USENIX Security Symposium, pages 1-1, Berkeley, CA, USA, 1999. USENIX Association.
-
(1999)
SSYM'99: Proceedings of the 8th Conference on USENIX Security Symposium
, pp. 1-1
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
16
-
-
33751168960
-
The usability of passphrases for authentication: An empirical field study
-
M. Keith, B. Shao, and P. J. Steinbart. The usability of passphrases for authentication: An empirical field study. Int. J. Hum.-Comput. Stud., 65(1):17-28, 2007.
-
(2007)
Int. J. Hum.-Comput. Stud
, vol.65
, Issue.1
, pp. 17-28
-
-
Keith, M.1
Shao, B.2
Steinbart, P.J.3
-
17
-
-
36849088574
-
Facemail: Showing faces of recipients to prevent misdirected email
-
New York, NY, USA, ACM
-
E. Lieberman and R. C. Miller. Facemail: showing faces of recipients to prevent misdirected email. In SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security, pages 122-131, New York, NY, USA, 2007. ACM.
-
(2007)
SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security
, pp. 122-131
-
-
Lieberman, E.1
Miller, R.C.2
-
18
-
-
65449128678
-
-
Passfaces Corporation. The Science Behind Passfaces
-
Passfaces Corporation. The Science Behind Passfaces.
-
-
-
-
19
-
-
65449115896
-
-
Passfaces Corporation
-
Passfaces Corporation: http://www.passfaces.com.
-
-
-
-
20
-
-
0035387175
-
Transforming the 'weakest link' a human/computer interaction approach to usable and effective security
-
M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the 'weakest link' a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3):122-131, 2001.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
21
-
-
65449166643
-
-
Search Security.com - http://searchsecurity.techtarget.com/news/article/ 0,289142,sidl4-gci895483,00.html. Employees willing to share passwords with strangers (2003) last accessed 23/02/2008.
-
Search Security.com - http://searchsecurity.techtarget.com/news/article/ 0,289142,sidl4-gci895483,00.html. Employees willing to share passwords with strangers (2003) last accessed 23/02/2008.
-
-
-
-
22
-
-
65449189017
-
-
Searchsecurity.com - http://searchsecurity.techtarget.com/news/article/0, 289142,sidl4-gci902867,00.html. Most workers must remember 6 passwords or more (2003) last accessed 23/02/2008.
-
Searchsecurity.com - http://searchsecurity.techtarget.com/news/article/0, 289142,sidl4-gci902867,00.html. Most workers must remember 6 passwords or more (2003) last accessed 23/02/2008.
-
-
-
-
23
-
-
0039068594
-
Authenticating users by word association
-
S. L. Smith. Authenticating users by word association. Comput. Secur., 6:464-470, 1987.
-
(1987)
Comput. Secur
, vol.6
, pp. 464-470
-
-
Smith, S.L.1
-
24
-
-
33846307457
-
Graphical Passwords: A Survey
-
Washington, DC, USA, IEEE Computer Society
-
X. Suo, Y. Zhu, and G. S. Owen. Graphical Passwords: A Survey. In ACS AC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 463-472, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ACS AC '05: Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 463-472
-
-
Suo, X.1
Zhu, Y.2
Owen, G.S.3
-
26
-
-
0003306197
-
An Evaluation of the Passface Personal Authentication System. Technical Report
-
London: Goldmsiths College University of London
-
T. Valentine. An Evaluation of the Passface Personal Authentication System. Technical Report. London: Goldmsiths College University of London., 1998.
-
(1998)
-
-
Valentine, T.1
-
27
-
-
0003308390
-
Memory for Passfaces after a long delay. Technical Report
-
London: Goldmsiths College University of London
-
T. Valentine. Memory for Passfaces after a long delay. Technical Report. London: Goldmsiths College University of London., 1998.
-
(1998)
-
-
Valentine, T.1
-
28
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. PassPoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum.-Comput. Stud., 63(1-2):102-127, 2005.
-
(2005)
Int. J. Hum.-Comput. Stud
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
29
-
-
12844275960
-
Password Memorability and Security: Empirical Results
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password Memorability and Security: Empirical Results. IEEE Security and Privacy, 2(5):25-31, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
30
-
-
0025545602
-
Cognitive passwords: The key to easy access control
-
M. Zviran and W. J. Haga. Cognitive passwords: the key to easy access control. Comput. Secur., 9(9):723-736, 1990.
-
(1990)
Comput. Secur
, vol.9
, Issue.9
, pp. 723-736
-
-
Zviran, M.1
Haga, W.J.2
-
31
-
-
0003369812
-
A comparison of password techniques for multilevel authentication mechanisms
-
M. Zviran and W. J. Haga. A comparison of password techniques for multilevel authentication mechanisms. The Computer Journal, 3(3), 1993.
-
(1993)
The Computer Journal
, vol.3
, Issue.3
-
-
Zviran, M.1
Haga, W.J.2
|