메뉴 건너뛰기




Volumn 26 LNBIP, Issue , 2009, Pages 233-239

TwoStep: An authentication method combining text and graphical passwords

Author keywords

Graphical Passwords; Phishing; Security; User Authentication

Indexed keywords

COMPUTER CRIME; SECURITY OF DATA;

EID: 67249127104     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-01187-0_19     Document Type: Conference Paper
Times cited : (27)

References (15)
  • 2
    • 84900557334 scopus 로고    scopus 로고
    • In?uencing Users Towards Better Passwords: Persuasive Cued Click-Points
    • September
    • Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.C.: In?uencing Users Towards Better Passwords: Persuasive Cued Click-Points. In: Proc. of HCI 2008 (September 2008)
    • (2008) Proc. of HCI
    • Chiasson, S.1    Forget, A.2    Biddle, R.3    van Oorschot, P.C.4
  • 3
    • 38049014958 scopus 로고    scopus 로고
    • Graphical Password Authentication Using Cued Click Points
    • Biskup, J, Lopez, J, eds, ESORICS 2007, Springer, Heidelberg
    • Chiasson, S., van Oorschot, P.C., Biddle, R.: Graphical Password Authentication Using Cued Click Points. In: Biskup, J., Lopez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 359-374. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 359-374
    • Chiasson, S.1    van Oorschot, P.C.2    Biddle, R.3
  • 4
    • 33745136298 scopus 로고    scopus 로고
    • Real User Corporation, September
    • Real User Corporation. The Science Behind Passfaces (September 2001)
    • (2001) The Science Behind Passfaces
  • 5
    • 85084162383 scopus 로고    scopus 로고
    • Davis, D., Monrose, F., Reiter, M.: On User Choice in Graphical Password Schemes. In: Proc. of 13th USENIX Security Symposium (August 2004)
    • Davis, D., Monrose, F., Reiter, M.: On User Choice in Graphical Password Schemes. In: Proc. of 13th USENIX Security Symposium (August 2004)
  • 6
    • 85084161493 scopus 로고    scopus 로고
    • Dhamija, R., Perrig, A.: Deja Vu: A User Study Using Images for Authentication. In: Proc. of 9th USENIX Security Symposium (August 2000)
    • Dhamija, R., Perrig, A.: Deja Vu: A User Study Using Images for Authentication. In: Proc. of 9th USENIX Security Symposium (August 2000)
  • 7
    • 33745816410 scopus 로고    scopus 로고
    • Dhamija, R., Tygar, J., Hearst, M.: Why Phishing Works. In: Proc. of Human Factors in Computing Systems (April 2006)
    • Dhamija, R., Tygar, J., Hearst, M.: Why Phishing Works. In: Proc. of Human Factors in Computing Systems (April 2006)
  • 8
    • 84911351837 scopus 로고    scopus 로고
    • 51Logon: Simplifying SignIn Experience (in Chinese), http://www.51Logon. com
    • 51Logon: Simplifying SignIn Experience (in Chinese), http://www.51Logon. com
  • 9
    • 84911358945 scopus 로고    scopus 로고
    • Felton, E., Balfanz, D., Dean, D., Wallach, D.: Web Spoo?ng: An Internet Con Game. In: Proc. of the 20th National Information systems Security Conference (October 1997)
    • Felton, E., Balfanz, D., Dean, D., Wallach, D.: Web Spoo?ng: An Internet Con Game. In: Proc. of the 20th National Information systems Security Conference (October 1997)
  • 10
    • 35348884906 scopus 로고    scopus 로고
    • A Large-Scale Study of Web Password Habits
    • World Wide Web
    • Florencio, D., Herley, C.: A Large-Scale Study of Web Password Habits. In: Proc. of the 2007 World Wide Web (2007)
    • (2007) Proc. of the
    • Florencio, D.1    Herley, C.2
  • 11
    • 34548735379 scopus 로고    scopus 로고
    • Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Schemes (Extended Ab- stract). In: Proc. of the 2007 IEEE Symposium on Security and Privacy (May 2007)
    • Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Schemes (Extended Ab- stract). In: Proc. of the 2007 IEEE Symposium on Security and Privacy (May 2007)
  • 13
    • 84911351836 scopus 로고    scopus 로고
    • Kumar, M., Gar?nkel, T., Boneh, D., Winograd, T.: Reducing Shoulder-sur?ng by Using Gaze-based Password Entry. In: Proc. of SOUPS 2007 (July 2007)
    • Kumar, M., Gar?nkel, T., Boneh, D., Winograd, T.: Reducing Shoulder-sur?ng by Using Gaze-based Password Entry. In: Proc. of SOUPS 2007 (July 2007)
  • 15
    • 33751057130 scopus 로고    scopus 로고
    • Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: Proc. of the 2006 IEEE Symposium on Security and Privacy (May 2006)
    • Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: Proc. of the 2006 IEEE Symposium on Security and Privacy (May 2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.