-
2
-
-
84900557334
-
In?uencing Users Towards Better Passwords: Persuasive Cued Click-Points
-
September
-
Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.C.: In?uencing Users Towards Better Passwords: Persuasive Cued Click-Points. In: Proc. of HCI 2008 (September 2008)
-
(2008)
Proc. of HCI
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
van Oorschot, P.C.4
-
3
-
-
38049014958
-
Graphical Password Authentication Using Cued Click Points
-
Biskup, J, Lopez, J, eds, ESORICS 2007, Springer, Heidelberg
-
Chiasson, S., van Oorschot, P.C., Biddle, R.: Graphical Password Authentication Using Cued Click Points. In: Biskup, J., Lopez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 359-374. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 359-374
-
-
Chiasson, S.1
van Oorschot, P.C.2
Biddle, R.3
-
4
-
-
33745136298
-
-
Real User Corporation, September
-
Real User Corporation. The Science Behind Passfaces (September 2001)
-
(2001)
The Science Behind Passfaces
-
-
-
5
-
-
85084162383
-
-
Davis, D., Monrose, F., Reiter, M.: On User Choice in Graphical Password Schemes. In: Proc. of 13th USENIX Security Symposium (August 2004)
-
Davis, D., Monrose, F., Reiter, M.: On User Choice in Graphical Password Schemes. In: Proc. of 13th USENIX Security Symposium (August 2004)
-
-
-
-
6
-
-
85084161493
-
-
Dhamija, R., Perrig, A.: Deja Vu: A User Study Using Images for Authentication. In: Proc. of 9th USENIX Security Symposium (August 2000)
-
Dhamija, R., Perrig, A.: Deja Vu: A User Study Using Images for Authentication. In: Proc. of 9th USENIX Security Symposium (August 2000)
-
-
-
-
7
-
-
33745816410
-
-
Dhamija, R., Tygar, J., Hearst, M.: Why Phishing Works. In: Proc. of Human Factors in Computing Systems (April 2006)
-
Dhamija, R., Tygar, J., Hearst, M.: Why Phishing Works. In: Proc. of Human Factors in Computing Systems (April 2006)
-
-
-
-
8
-
-
84911351837
-
-
51Logon: Simplifying SignIn Experience (in Chinese), http://www.51Logon. com
-
51Logon: Simplifying SignIn Experience (in Chinese), http://www.51Logon. com
-
-
-
-
9
-
-
84911358945
-
-
Felton, E., Balfanz, D., Dean, D., Wallach, D.: Web Spoo?ng: An Internet Con Game. In: Proc. of the 20th National Information systems Security Conference (October 1997)
-
Felton, E., Balfanz, D., Dean, D., Wallach, D.: Web Spoo?ng: An Internet Con Game. In: Proc. of the 20th National Information systems Security Conference (October 1997)
-
-
-
-
10
-
-
35348884906
-
A Large-Scale Study of Web Password Habits
-
World Wide Web
-
Florencio, D., Herley, C.: A Large-Scale Study of Web Password Habits. In: Proc. of the 2007 World Wide Web (2007)
-
(2007)
Proc. of the
-
-
Florencio, D.1
Herley, C.2
-
11
-
-
34548735379
-
-
Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Schemes (Extended Ab- stract). In: Proc. of the 2007 IEEE Symposium on Security and Privacy (May 2007)
-
Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Schemes (Extended Ab- stract). In: Proc. of the 2007 IEEE Symposium on Security and Privacy (May 2007)
-
-
-
-
12
-
-
85084161999
-
The Design and Analysis of Graphical Passwords
-
August 23-26
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.: The Design and Analysis of Graphical Passwords. In: Proc. of the 8th USENIX Security Symposium, August 23-26 (1999)
-
(1999)
Proc. of the 8th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.5
-
13
-
-
84911351836
-
-
Kumar, M., Gar?nkel, T., Boneh, D., Winograd, T.: Reducing Shoulder-sur?ng by Using Gaze-based Password Entry. In: Proc. of SOUPS 2007 (July 2007)
-
Kumar, M., Gar?nkel, T., Boneh, D., Winograd, T.: Reducing Shoulder-sur?ng by Using Gaze-based Password Entry. In: Proc. of SOUPS 2007 (July 2007)
-
-
-
-
15
-
-
33751057130
-
-
Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: Proc. of the 2006 IEEE Symposium on Security and Privacy (May 2006)
-
Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: Proc. of the 2006 IEEE Symposium on Security and Privacy (May 2006)
-
-
-
|