-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A., Sasse, M. A. 1999. Users are not the enemy. In: Communications of the ACM, 42:12, 40-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
12244260624
-
Graphical passwords
-
United States Patent 5559961
-
Blonder, G., 1996. Graphical passwords. United States Patent 5559961.
-
(1996)
-
-
Blonder, G.1
-
3
-
-
0003429117
-
Are Passfaces More Usable Than Passwords? A Field Trial Investigation
-
Brostoff, S., Sasse, M.A. 2000. Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In: Proceedings of the HCI 2000. 405-424.
-
(2000)
Proceedings of the HCI 2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
4
-
-
0347883257
-
-
Craik, F. I. M., Lockhart, R. S. 1972. Levels of processing: A framework for memory research. In: Journal of Verbal Learning and Verbal Behavior, 11.
-
Craik, F. I. M., Lockhart, R. S. 1972. Levels of processing: A framework for memory research. In: Journal of Verbal Learning and Verbal Behavior, 11.
-
-
-
-
5
-
-
85084162383
-
On user choice in graphical password schemes
-
San Diego, California, August 9-13
-
Davis, D., Monrose, F., Reiter, M. K. 2004. On user choice in graphical password schemes. In: Proceedings of the 13th USENIX Security Symposium, (San Diego, California, August 9-13), 151-164.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 151-164
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
6
-
-
19944372131
-
-
De Angeli, A., Coventry, L., Johnson, G., Renaud, K. 2005. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems, In: International Journal of Human-Computer Studies, 63:1-2, 128-152.
-
De Angeli, A., Coventry, L., Johnson, G., Renaud, K. 2005. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems, In: International Journal of Human-Computer Studies, 63:1-2, 128-152.
-
-
-
-
7
-
-
57349195511
-
-
De Luca, A., Weiss, R., Drewes, H. Evaluation of Eye-Gaze Interaction Methods for Security Enhanced PINEntry. In: Proceedings of OZCHI 2007, Adelaide, Australia, 28 - 30.11.2007.
-
De Luca, A., Weiss, R., Drewes, H. Evaluation of Eye-Gaze Interaction Methods for Security Enhanced PINEntry. In: Proceedings of OZCHI 2007, Adelaide, Australia, 28 - 30.11.2007.
-
-
-
-
8
-
-
70049091851
-
Eyepass - eye-stroke authentication for public terminals
-
Florence, Italy, April 05
-
De Luca, A., Weiss, R., Hußmann, H., and An, X. 2008. Eyepass - eye-stroke authentication for public terminals. In CHI '08 Extended Abstracts. Florence, Italy, April 05 - 10, 2008.
-
(2008)
CHI '08 Extended Abstracts
, vol.10
-
-
De Luca, A.1
Weiss, R.2
Hußmann, H.3
An, X.4
-
9
-
-
63549135258
-
Modeling user choice in the PassPoints graphical password scheme
-
Pittsburgh, Pennsylvania, July 18, 20
-
Dirik, A. E., Memon, N., Birget, J. 2007. Modeling user choice in the PassPoints graphical password scheme. In Proceedings of the SOUPS 2007, (Pittsburgh, Pennsylvania, July 18 - 20, 2007).
-
(2007)
Proceedings of the SOUPS 2007
-
-
Dirik, A.E.1
Memon, N.2
Birget, J.3
-
10
-
-
85084161493
-
Déjà Vu: A user study using images for authentication
-
Denver, Colorado, August 14, 17
-
Dhamija, R., Perrig, A. 2000. Déjà Vu: a user study using images for authentication. In: Proceedings of the 9th Conference on USENIX Security Symposium (Denver, Colorado, August 14 - 17, 2000), 45-58.
-
(2000)
Proceedings of the 9th Conference on USENIX Security Symposium
, pp. 45-58
-
-
Dhamija, R.1
Perrig, A.2
-
11
-
-
84937308816
-
Order of strokes writing as a cue for retrieval in reading chinese characters
-
Flores d'Arcais G. 1994. Order of strokes writing as a cue for retrieval in reading chinese characters. In: Europ. Journal of Cognitive Psychology, 6:4, 337-55.
-
(1994)
Europ. Journal of Cognitive Psychology
, vol.6
, Issue.4
, pp. 337-355
-
-
Flores d'Arcais, G.1
-
12
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
Portland, Oregon, August 27
-
Klein, D. 1990. Foiling the cracker: A survey of, and improvements to, password security. In Proceedings of the 2nd USENIX Security Workshop (Portland, Oregon, August 27, 1990), 5-14.
-
(1990)
Proceedings of the 2nd USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.1
-
13
-
-
85084161999
-
The design and analysis of graphical passwords
-
Washington, D.C, August 23-26
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., Rubin, A. D. 1999. The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX Security Symposium (Washington, D.C., August 23-26,1999), 1-14.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 1-14
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
14
-
-
0028933802
-
The effect of repeated writing on memory
-
Naka, M., Naoi, H. 1995. The effect of repeated writing on memory. In: Memory & Cognition, 23:2.
-
(1995)
Memory & Cognition
, vol.23
, pp. 2
-
-
Naka, M.1
Naoi, H.2
-
15
-
-
21644455927
-
Analyzing User Choice in Graphical Passwords
-
Tech. Report TR-04-01, School of Computer Science, Carleton University, Canada
-
Nali, D., Thorpe, J. 2004. Analyzing User Choice in Graphical Passwords. Tech. Report TR-04-01, School of Computer Science, Carleton University, Canada.
-
(2004)
-
-
Nali, D.1
Thorpe, J.2
-
17
-
-
0002289845
-
Picture Superiority in Free Recall: Imagery or Dual Coding?
-
Paivio, A., Csapo, K. 1973. Picture Superiority in Free Recall: Imagery or Dual Coding? In: Cognitive Psychology 5, 176-206.
-
(1973)
Cognitive Psychology
, vol.5
, pp. 176-206
-
-
Paivio, A.1
Csapo, K.2
-
18
-
-
70049103672
-
-
Real User Corporation
-
Real User Corporation. PassFaces Personal. http://www.passfaces.com.
-
PassFaces Personal
-
-
-
19
-
-
9944240263
-
My password is here! An investigation into visuo-spatial authentication mechanisms
-
Renaud, K., De Angeli, A. 2004. My password is here! An investigation into visuo-spatial authentication mechanisms. In: Interacting with Computers, 16:6.
-
(2004)
Interacting with Computers
, vol.16
, pp. 6
-
-
Renaud, K.1
De Angeli, A.2
-
20
-
-
0035387175
-
Transforming the 'weakest link': A human-computer interaction approach to usable and effective security
-
Sasse, M.A., Brostoff, S., Weirich, D. 2001. Transforming the 'weakest link': a human-computer interaction approach to usable and effective security. In: BT Technology Journal 19:3, 122-131.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
21
-
-
55349144810
-
Functional Stages in the Formation of Human Long-Term Motor Memory
-
Shadmer, R., Brashers-Krug, T. 1999. Functional Stages in the Formation of Human Long-Term Motor Memory. In: The Journal of Neuroscience, 17:1.
-
(1999)
The Journal of Neuroscience
, vol.17
, pp. 1
-
-
Shadmer, R.1
Brashers-Krug, T.2
-
22
-
-
84946407085
-
Perception and memory for pictures: Single-trial learning of 2500 visual stimuli
-
Standing, L., Conezio, J., Haber, R.N. 1970. Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. In: Psychonomic Science 19:2, 73-74.
-
(1970)
Psychonomic Science
, vol.19
, Issue.2
, pp. 73-74
-
-
Standing, L.1
Conezio, J.2
Haber, R.N.3
-
23
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., Memon, N. 2005. PassPoints: Design and longitudinal evaluation of a graphical password system. In: International Journal of Human-Computer Studies (HCI Research in Privacy and Security) 63, 102-127.
-
(2005)
International Journal of Human-Computer Studies (HCI Research in Privacy and Security)
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.3
Brodskiy, A.4
Memon, N.5
|