-
1
-
-
84888519309
-
-
Flickr. http://www.flickr.com.
-
-
-
-
2
-
-
84888503361
-
-
October 26, 2006
-
Phoney finance. The Economist. October 26, 2006. http://www.economist. com/finance/ displaystory.cfm?story-id=8089667.
-
Phoney finance. The Economist
-
-
-
3
-
-
0027758414
-
Why cryptosystems fail
-
Nov
-
R. Anderson. Why cryptosystems fail. In Proc. ACM CCS, pages 215-227, Nov. 1993.
-
(1993)
Proc. ACM CCS
, pp. 215-227
-
-
Anderson, R.1
-
4
-
-
65449181365
-
-
United states patent, United States Patent 5559961
-
G. Blonder. United states patent, 1996. United States Patent 5559961.
-
(1996)
-
-
Blonder, G.1
-
6
-
-
0003429117
-
Are passfaces more usable than passwords? A field trial investigation
-
Sept
-
S. Brostoff and M. Sasse. Are passfaces more usable than passwords? A field trial investigation. In Proceedings of HCI 2000, pages 405-424, Sept. 2000.
-
(2000)
Proceedings of HCI
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.2
-
7
-
-
0346098055
-
Face recognition in poor quality video: Evidence from security surveillance
-
M. Burton, S. Wilson, M. Cowan, and V. Bruce. Face recognition in poor quality video: Evidence from security surveillance. Psychological Science, 10:243-248, 1999.
-
(1999)
Psychological Science
, vol.10
, pp. 243-248
-
-
Burton, M.1
Wilson, S.2
Cowan, M.3
Bruce, V.4
-
10
-
-
84864891648
-
Visual recognition memory for complex configurations
-
A. Goldstein and J. E. Chance. Visual recognition memory for complex configurations. Perception and Psychophysics, 9:237-241, 1970.
-
(1970)
Perception and Psychophysics
, vol.9
, pp. 237-241
-
-
Goldstein, A.1
Chance, J.E.2
-
13
-
-
33744903116
-
A user authentication system using schema of visual memory
-
Jan
-
A. Harada, T. Isarida, T. Mizuno, and M. Nishigaki. A user authentication system using schema of visual memory. In Proc. BioADIT'06, pages 338-345, Jan. 2006.
-
(2006)
Proc. BioADIT'06
, pp. 338-345
-
-
Harada, A.1
Isarida, T.2
Mizuno, T.3
Nishigaki, M.4
-
17
-
-
65449155857
-
Does the generation effect occur for pictures?
-
H. Kinjo and J. G. Snodgrass. Does the generation effect occur for pictures? Amer. J. of Psych., 6:156-163, 2000.
-
(2000)
Amer. J. of Psych
, vol.6
, pp. 156-163
-
-
Kinjo, H.1
Snodgrass, J.G.2
-
18
-
-
0036030112
-
Impact of artificial gummy fingers on fingerprint systems
-
Jan
-
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of artificial gummy fingers on fingerprint systems. In Proc. SPIE: Optical Security and Counterfeit Deterrence Techniques IV, volume 4677, pages 275-289, Jan. 2002.
-
(2002)
Proc. SPIE: Optical Security and Counterfeit Deterrence Techniques IV
, vol.4677
, pp. 275-289
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
19
-
-
35348895703
-
Pictures at the ATM: Exploring the usability of multiple graphical passwords
-
Apr
-
W. Moncur and G. Leplatre. Pictures at the ATM: exploring the usability of multiple graphical passwords. In Proc. ACM CHI, pages 887-894, Apr. 2007.
-
(2007)
Proc. ACM CHI
, pp. 887-894
-
-
Moncur, W.1
Leplatre, G.2
-
20
-
-
85084162383
-
On user choice to graphical password schemes
-
San Diego, CA, Aug
-
F. Monrose, D. Davis, and M. Reiter. On user choice to graphical password schemes. In Proc. of the 13th USENIX Security Symp., pages 151-164, San Diego, CA, Aug. 2004.
-
(2004)
Proc. of the 13th USENIX Security Symp
, pp. 151-164
-
-
Monrose, F.1
Davis, D.2
Reiter, M.3
-
21
-
-
33745136298
-
-
Real User Corporation
-
Real User Corporation. The science behind Passfaces, 2001. http://www.realusers.com.
-
(2001)
The science behind Passfaces
-
-
-
22
-
-
65449153072
-
Undercover: Authentication usable in front of prying eyes
-
Florence, Italy, Apr, To appear
-
H. Sasamoto, N. Christin, and E. Hayashi. Undercover: Authentication usable in front of prying eyes. In Proceedings of 2008 ACM Symposium on Computer-Human Interaction (CHI '08), Florence, Italy, Apr. 2008. To appear.
-
(2008)
Proceedings of 2008 ACM Symposium on Computer-Human Interaction (CHI '08)
-
-
Sasamoto, H.1
Christin, N.2
Hayashi, E.3
-
23
-
-
65449179409
-
Recognition memory for words, sentences and pictures
-
R. Shepard. Recognition memory for words, sentences and pictures. J. Verbal Learning and Verbal Behavior, 113(1):95-121, 1967.
-
(1967)
J. Verbal Learning and Verbal Behavior
, vol.113
, Issue.1
, pp. 95-121
-
-
Shepard, R.1
-
24
-
-
84888578549
-
-
Sony Corporation
-
Sony Corporation. Overview of FeliCa. http://www. sony.net/Products/ felica/abt/dvs.html.
-
Overview of FeliCa
-
-
-
25
-
-
84946407085
-
Perception and memory for pictures: Single trial learning of 2,500 visual stimuli
-
L. Standing, J. Conezio, and R. N. Haber. Perception and memory for pictures: single trial learning of 2,500 visual stimuli. Psychonomic Sci., 19(2):73-74, 1970.
-
(1970)
Psychonomic Sci
, vol.19
, Issue.2
, pp. 73-74
-
-
Standing, L.1
Conezio, J.2
Haber, R.N.3
-
26
-
-
38049030296
-
Inkblot authentication
-
Technical Report MSR-TR-2004-85, Aug
-
A. Stubblefield and D. Simon. Inkblot authentication. Technical Report MSR-TR-2004-85, Aug. 2004.
-
(2004)
-
-
Stubblefield, A.1
Simon, D.2
-
27
-
-
85084163855
-
Graphical dictionaries and the memorable space of graphical passwords
-
Aug
-
J. Thorpe and P. van Oorschot. Graphical dictionaries and the memorable space of graphical passwords. In Proc. 13th USENIX Security Symp., Aug. 2004.
-
(2004)
Proc. 13th USENIX Security Symp
-
-
Thorpe, J.1
van Oorschot, P.2
-
28
-
-
21644474142
-
Towards secure design choices for implementing graphical passwords
-
Dec
-
J. Thorpe and P. van Oorschot. Towards secure design choices for implementing graphical passwords. In Proc. 20th ACSAC, Dec. 2004.
-
(2004)
Proc. 20th ACSAC
-
-
Thorpe, J.1
van Oorschot, P.2
-
29
-
-
85049042638
-
Human-seeded attacks and exploiting hot-spots in graphical passwords
-
Aug
-
J. Thorpe and P. van Oorschot. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proc. 16th USENIX Security Symp., Aug. 2007.
-
(2007)
Proc. 16th USENIX Security Symp
-
-
Thorpe, J.1
van Oorschot, P.2
-
30
-
-
33751057130
-
Cognitive authentication schemes safe against spyware
-
May
-
D. Weinshall. Cognitive authentication schemes safe against spyware. In Proc. IEEE Symp. Sec. and Privacy, May 2006.
-
(2006)
Proc. IEEE Symp. Sec. and Privacy
-
-
Weinshall, D.1
-
31
-
-
35248891741
-
Authentication using graphical passwords: Basic results
-
July
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Basic results. In HCI International, July 2005.
-
(2005)
HCI International
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
32
-
-
60649116908
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
July
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: effects of tolerance and image choice. In Proc. of the 1st Symp. Usable Privacy and Security, pages 1-12, July 2005.
-
(2005)
Proc. of the 1st Symp. Usable Privacy and Security
, pp. 1-12
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
|