메뉴 건너뛰기




Volumn , Issue , 2008, Pages 35-43

Use Your Illusion: Secure authentication usable anywhere

Author keywords

Distortion; Graphical passwords; Social engineering

Indexed keywords

CELLULAR PHONES; DEGRADED IMAGES; DISTORTED IMAGES; DISTORTION; EQUIVALENT ERRORS; GRAPHICAL PASSWORDS; HUMAN ABILITIES; ORIGINAL IMAGES; SMALL DISPLAYS; SOCIAL ENGINEERING; TIME PERIODS; USABILITY STUDIES; USER AUTHENTICATIONS;

EID: 65449162720     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1408664.1408670     Document Type: Conference Paper
Times cited : (110)

References (32)
  • 1
    • 84888519309 scopus 로고    scopus 로고
    • Flickr. http://www.flickr.com.
  • 2
    • 84888503361 scopus 로고    scopus 로고
    • October 26, 2006
    • Phoney finance. The Economist. October 26, 2006. http://www.economist. com/finance/ displaystory.cfm?story-id=8089667.
    • Phoney finance. The Economist
  • 3
    • 0027758414 scopus 로고
    • Why cryptosystems fail
    • Nov
    • R. Anderson. Why cryptosystems fail. In Proc. ACM CCS, pages 215-227, Nov. 1993.
    • (1993) Proc. ACM CCS , pp. 215-227
    • Anderson, R.1
  • 4
    • 65449181365 scopus 로고    scopus 로고
    • United states patent, United States Patent 5559961
    • G. Blonder. United states patent, 1996. United States Patent 5559961.
    • (1996)
    • Blonder, G.1
  • 6
    • 0003429117 scopus 로고    scopus 로고
    • Are passfaces more usable than passwords? A field trial investigation
    • Sept
    • S. Brostoff and M. Sasse. Are passfaces more usable than passwords? A field trial investigation. In Proceedings of HCI 2000, pages 405-424, Sept. 2000.
    • (2000) Proceedings of HCI , pp. 405-424
    • Brostoff, S.1    Sasse, M.2
  • 7
    • 0346098055 scopus 로고    scopus 로고
    • Face recognition in poor quality video: Evidence from security surveillance
    • M. Burton, S. Wilson, M. Cowan, and V. Bruce. Face recognition in poor quality video: Evidence from security surveillance. Psychological Science, 10:243-248, 1999.
    • (1999) Psychological Science , vol.10 , pp. 243-248
    • Burton, M.1    Wilson, S.2    Cowan, M.3    Bruce, V.4
  • 8
    • 85084161493 scopus 로고    scopus 로고
    • Deja vu: A user study, using images for authentication
    • Aug
    • R. Dhamija and A. Perrig. Deja vu: A user study, using images for authentication. In Proc. 9th USENIX Security Symp., Aug. 2000.
    • (2000) Proc. 9th USENIX Security Symp
    • Dhamija, R.1    Perrig, A.2
  • 10
    • 84864891648 scopus 로고
    • Visual recognition memory for complex configurations
    • A. Goldstein and J. E. Chance. Visual recognition memory for complex configurations. Perception and Psychophysics, 9:237-241, 1970.
    • (1970) Perception and Psychophysics , vol.9 , pp. 237-241
    • Goldstein, A.1    Chance, J.E.2
  • 13
    • 33744903116 scopus 로고    scopus 로고
    • A user authentication system using schema of visual memory
    • Jan
    • A. Harada, T. Isarida, T. Mizuno, and M. Nishigaki. A user authentication system using schema of visual memory. In Proc. BioADIT'06, pages 338-345, Jan. 2006.
    • (2006) Proc. BioADIT'06 , pp. 338-345
    • Harada, A.1    Isarida, T.2    Mizuno, T.3    Nishigaki, M.4
  • 17
    • 65449155857 scopus 로고    scopus 로고
    • Does the generation effect occur for pictures?
    • H. Kinjo and J. G. Snodgrass. Does the generation effect occur for pictures? Amer. J. of Psych., 6:156-163, 2000.
    • (2000) Amer. J. of Psych , vol.6 , pp. 156-163
    • Kinjo, H.1    Snodgrass, J.G.2
  • 19
    • 35348895703 scopus 로고    scopus 로고
    • Pictures at the ATM: Exploring the usability of multiple graphical passwords
    • Apr
    • W. Moncur and G. Leplatre. Pictures at the ATM: exploring the usability of multiple graphical passwords. In Proc. ACM CHI, pages 887-894, Apr. 2007.
    • (2007) Proc. ACM CHI , pp. 887-894
    • Moncur, W.1    Leplatre, G.2
  • 21
    • 33745136298 scopus 로고    scopus 로고
    • Real User Corporation
    • Real User Corporation. The science behind Passfaces, 2001. http://www.realusers.com.
    • (2001) The science behind Passfaces
  • 23
    • 65449179409 scopus 로고
    • Recognition memory for words, sentences and pictures
    • R. Shepard. Recognition memory for words, sentences and pictures. J. Verbal Learning and Verbal Behavior, 113(1):95-121, 1967.
    • (1967) J. Verbal Learning and Verbal Behavior , vol.113 , Issue.1 , pp. 95-121
    • Shepard, R.1
  • 24
    • 84888578549 scopus 로고    scopus 로고
    • Sony Corporation
    • Sony Corporation. Overview of FeliCa. http://www. sony.net/Products/ felica/abt/dvs.html.
    • Overview of FeliCa
  • 25
    • 84946407085 scopus 로고
    • Perception and memory for pictures: Single trial learning of 2,500 visual stimuli
    • L. Standing, J. Conezio, and R. N. Haber. Perception and memory for pictures: single trial learning of 2,500 visual stimuli. Psychonomic Sci., 19(2):73-74, 1970.
    • (1970) Psychonomic Sci , vol.19 , Issue.2 , pp. 73-74
    • Standing, L.1    Conezio, J.2    Haber, R.N.3
  • 26
    • 38049030296 scopus 로고    scopus 로고
    • Inkblot authentication
    • Technical Report MSR-TR-2004-85, Aug
    • A. Stubblefield and D. Simon. Inkblot authentication. Technical Report MSR-TR-2004-85, Aug. 2004.
    • (2004)
    • Stubblefield, A.1    Simon, D.2
  • 27
    • 85084163855 scopus 로고    scopus 로고
    • Graphical dictionaries and the memorable space of graphical passwords
    • Aug
    • J. Thorpe and P. van Oorschot. Graphical dictionaries and the memorable space of graphical passwords. In Proc. 13th USENIX Security Symp., Aug. 2004.
    • (2004) Proc. 13th USENIX Security Symp
    • Thorpe, J.1    van Oorschot, P.2
  • 28
    • 21644474142 scopus 로고    scopus 로고
    • Towards secure design choices for implementing graphical passwords
    • Dec
    • J. Thorpe and P. van Oorschot. Towards secure design choices for implementing graphical passwords. In Proc. 20th ACSAC, Dec. 2004.
    • (2004) Proc. 20th ACSAC
    • Thorpe, J.1    van Oorschot, P.2
  • 29
    • 85049042638 scopus 로고    scopus 로고
    • Human-seeded attacks and exploiting hot-spots in graphical passwords
    • Aug
    • J. Thorpe and P. van Oorschot. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proc. 16th USENIX Security Symp., Aug. 2007.
    • (2007) Proc. 16th USENIX Security Symp
    • Thorpe, J.1    van Oorschot, P.2
  • 30
    • 33751057130 scopus 로고    scopus 로고
    • Cognitive authentication schemes safe against spyware
    • May
    • D. Weinshall. Cognitive authentication schemes safe against spyware. In Proc. IEEE Symp. Sec. and Privacy, May 2006.
    • (2006) Proc. IEEE Symp. Sec. and Privacy
    • Weinshall, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.