-
2
-
-
0003429117
-
™ more usable than passwords? A field trial investigation
-
™ more usable than passwords? A field trial investigation. Proc. of HCI, 2000, pp 405-424
-
(2000)
Proc. of HCI
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
7
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The Design and Analysis of Graphical Passwords, Proc. USENIX Security Symposium, 1999.
-
(1999)
Proc. USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
8
-
-
21644455927
-
Analyzing user choice in graphical passwords
-
School of Computer Science, Carleton University
-
D Nali and J Thorpe. Analyzing User Choice in Graphical Passwords, Technical Report TR-04-01, School of Computer Science, Carleton University, 2004
-
(2004)
Technical Report TR-04-01
-
-
Nali, D.1
Thorpe, J.2
-
10
-
-
33745136298
-
-
Real User Corporation, Sept, Available at
-
Real User Corporation. The Science Behind Passfaces. Revision 2, Sept 2001. Available at http://www.realuser.com/published/ScienceBehindPassfacespdf.
-
(2001)
The Science Behind Passfaces. Revision 2
-
-
-
11
-
-
33846307457
-
Graphical passwords: A survey
-
X. Suo, Y Zhu and GS Owen. Graphical Passwords: A Survey. ACSAC, 2005.
-
(2005)
ACSAC
-
-
Suo, X.1
Zhu, Y.2
Gs, O.3
-
13
-
-
21644474142
-
Towards secure design choices for implementing graphical passwords
-
An extended version available at
-
J. Thorpe and P. C. van Oorschot. Towards secure design choices for implementing graphical passwords. ACSAC, 2004. An extended version available at http://www.scs.carleton. ca/~jthorpe/extendedStrokespdf.
-
(2004)
ACSAC
-
-
Thorpe, J.1
Van Oorschot, P.C.2
-
15
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
S Wiedenbeck, J Waters, JC Birget, A Brodskiy and N Memon. PassPoints: design and longitudinal evaluation of a graphical password system. Int'l J. of Human Computer Studies. vol. 63, pp. 102-127, 2005.
-
(2005)
Int'l J. of Human Computer Studies
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
16
-
-
77952334760
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
ACM Press
-
S Wiedenbeck, J Waters, JC Birget, A Brodskiy and N Memon. Authentication using graphical passwords: effects of tolerance and image choice. SOUPS'05, CMU, USA. ACM Press.
-
SOUPS'05, CMU, USA
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
17
-
-
12844275960
-
Password memorability and security: Empirical results
-
J. Yan, A. Blackwell, R. Anderson and A. Grant. Password Memorability and Security: Empirical Results. IEEE Security & Privacy, Vol. 2 No. 5, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
18
-
-
0242708748
-
A note on proactive password checking
-
New Mexico, USA
-
J. Yan. A Note on Proactive Password Checking. ACM New Security Paradigms Workshop, New Mexico, USA, 2001.
-
(2001)
ACM New Security Paradigms Workshop
-
-
Yan, J.1
-
19
-
-
77952346529
-
-
VisKey, last accessed in Feb
-
VisKey, http://www.sfr-software.de/cms/EN/pocketpc/viskey/index.html, last accessed in Feb, 2007.
-
(2007)
-
-
-
20
-
-
77952334290
-
-
V-GO, last accessed in Feb
-
V-GO, http://www.passlogix.com/, last accessed in Feb, 2007.
-
(2007)
-
-
|