-
2
-
-
74049101881
-
-
M. Anderson and J. Neely. Memory. Handbook of Perception and Cognition, chapter 8: Interference and inhibition in memory retrieval, pages 237-313. Academic Press, 2nd edition, 1996.
-
M. Anderson and J. Neely. Memory. Handbook of Perception and Cognition, chapter 8: Interference and inhibition in memory retrieval, pages 237-313. Academic Press, 2nd edition, 1996.
-
-
-
-
3
-
-
12244260624
-
Graphical passwords
-
United States Patent 5,559,961
-
G. Blonder. Graphical passwords. United States Patent 5,559,961, 1996.
-
(1996)
-
-
Blonder, G.1
-
5
-
-
0018816168
-
Sex differences in cognitive functioning: Evidence, determinants, implications
-
B. Burstein, L. Bank, and L. Jarvik. Sex differences in cognitive functioning: Evidence, determinants, implications. Human Development, 23:289-313, 1980.
-
(1980)
Human Development
, vol.23
, pp. 289-313
-
-
Burstein, B.1
Bank, L.2
Jarvik, L.3
-
8
-
-
70350567265
-
User interface design affects security: Patterns in click-based graphical passwords
-
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot. User interface design affects security: Patterns in click-based graphical passwords. International Journal of Information Security, 8(5), 2009.
-
(2009)
International Journal of Information Security
, vol.8
, Issue.5
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
van Oorschot, P.C.4
-
12
-
-
74049095779
-
-
S. Designer. John the Ripper password cracker. http://www.openwall.com/ john/.
-
S. Designer. John the Ripper password cracker. http://www.openwall.com/ john/.
-
-
-
-
14
-
-
84892465782
-
A comprehensive study of frequency, interference, and training of multiple graphical passwords
-
April
-
K. Everitt, T. Bragin, J. Fogarty, and T. Kohno. A comprehensive study of frequency, interference, and training of multiple graphical passwords. In ACM Conference on Human Factors in Computing Systems (CHI), April 2009.
-
(2009)
ACM Conference on Human Factors in Computing Systems (CHI)
-
-
Everitt, K.1
Bragin, T.2
Fogarty, J.3
Kohno, T.4
-
20
-
-
38049011983
-
Click passwords under investigation
-
12th European Symposium On Research In Computer Security ESORICS, September
-
K. Golofit. Click passwords under investigation. In 12th European Symposium On Research In Computer Security (ESORICS), Springer LNCS 4734, September 2007.
-
(2007)
Springer LNCS
, vol.4734
-
-
Golofit, K.1
-
22
-
-
74049161443
-
The Oxford Handbook of Memory
-
chapter 3:, Oxford University Press: New York, NY
-
R. S. Lockhart. The Oxford Handbook of Memory, chapter 3: Methods of Memory Research, pages 45-57. Oxford University Press: New York, NY, 2000.
-
(2000)
Methods of Memory Research
, pp. 45-57
-
-
Lockhart, R.S.1
-
24
-
-
74049158029
-
-
S. Madigan. Chapter 3: Picture memory. In J. Yuille, editor, Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio, chapter 3. Picture Memory, pages 65-89. Lawrence Erlbaum Associates, 1983.
-
S. Madigan. Chapter 3: Picture memory. In J. Yuille, editor, Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio, chapter 3. Picture Memory, pages 65-89. Lawrence Erlbaum Associates, 1983.
-
-
-
-
26
-
-
39149113346
-
Graphical passwords
-
L. Cranor and S. Garfinkel, editors, chapter 9, O'Reilly
-
F. Monrose and M. Reiter. Graphical passwords. In L. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems That People Can Use, chapter 9, pages 157-174. O'Reilly, 2005.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 157-174
-
-
Monrose, F.1
Reiter, M.2
-
27
-
-
74049154958
-
-
accessed February 2007
-
PD Photo. PD Photo website. http://pdphoto.org, accessed February 2007.
-
PD Photo. PD Photo website
-
-
-
28
-
-
74049140555
-
-
M. Peters. Revised Vandenberg & Kuse Mental Rotations Tests: forms MRT-A to MRT-D. Technical report, Department of Psychology, University of Guelph, 1995.
-
M. Peters. Revised Vandenberg & Kuse Mental Rotations Tests: forms MRT-A to MRT-D. Technical report, Department of Psychology, University of Guelph, 1995.
-
-
-
-
29
-
-
35348885452
-
Evaluating authentication mechanisms
-
L. Cranor and S. Garfinkel, editors, chapter 6, O'Reilly Media
-
K. Renaud. Evaluating authentication mechanisms. In L. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems That People Can Use, chapter 6, pages 103-128. O'Reilly Media, 2005.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 103-128
-
-
Renaud, K.1
-
31
-
-
84946407085
-
Perception and memory for pictures: Single-trial learning of 2500 visual stimuli
-
L. Standing, J. Conezio, and R. Haber. Perception and memory for pictures: Single-trial learning of 2500 visual stimuli. Psychonomic Science, 19(2):73-74, 1970.
-
(1970)
Psychonomic Science
, vol.19
, Issue.2
, pp. 73-74
-
-
Standing, L.1
Conezio, J.2
Haber, R.3
-
33
-
-
85049042638
-
Human-seeded attacks and exploiting hot-spots in graphical passwords
-
August
-
J. Thorpe and P. C. van Oorschot. Human-seeded attacks and exploiting hot-spots in graphical passwords. In 16th USENIX Security Symposium, August 2007.
-
(2007)
16th USENIX Security Symposium
-
-
Thorpe, J.1
van Oorschot, P.C.2
-
35
-
-
0030496061
-
A nonparametric measure of spatial interaction in point patterns
-
M. van Lieshout and A. Baddeley. A nonparametric measure of spatial interaction in point patterns. Statistica Neerlandica, 50(3):344-361, 1996.
-
(1996)
Statistica Neerlandica
, vol.50
, Issue.3
, pp. 344-361
-
-
van Lieshout, M.1
Baddeley, A.2
-
36
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
K.-P. L. Vu, R. Proctor, A. Bhargav-Spantzel, B.-L. Tai, J. Cook, and E. Schultz. Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies, 65:744-757, 2007.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, pp. 744-757
-
-
Vu, K.-P.L.1
Proctor, R.2
Bhargav-Spantzel, A.3
Tai, B.-L.4
Cook, J.5
Schultz, E.6
-
37
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
Washington, D.C, August
-
A. Whitten and J. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, Washington, D.C., August 1999.
-
(1999)
8th USENIX Security Symposium
-
-
Whitten, A.1
Tygar, J.2
-
38
-
-
35248891741
-
Authentication using graphical passwords: Basic results
-
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Basic results. In 11th International Conference on Human-Computer Interaction (HCI International), 2005.
-
(2005)
11th International Conference on Human-Computer Interaction (HCI International)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.3
Brodskiy, A.4
Memon, N.5
-
39
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63(1-2):102-127, 2005.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.3
Brodskiy, A.4
Memon, N.5
-
40
-
-
34248342555
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
July
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Effects of tolerance and image choice. In 1st Symposium on Usable Privacy and Security (SOUPS), July 2005.
-
(2005)
1st Symposium on Usable Privacy and Security (SOUPS)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
|