-
5
-
-
84995399871
-
Human identification through insecure channel
-
Advances in Cryptology - EUROCRYPT'91, ser. D. Davies, Ed., Berlin: Springer-Verlag
-
T. Matsumoto and H. Imai, "Human identification through insecure channel," in Advances in Cryptology - EUROCRYPT'91, ser. Lecture Notes in Computer Science, D. Davies, Ed., vol. 547. Berlin: Springer-Verlag, 1991, pp. 409-421.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 409-421
-
-
Matsumoto, T.1
Imai, H.2
-
7
-
-
51249089651
-
A virtual password scheme to protect passwords
-
IEEE
-
M. Lei, Y. Xiao, S. V. Vrbsky, C.-C. Li, and L. Liu, "A virtual password scheme to protect passwords," in Proceedings of IEEE International Conference on Communications (ICC'2008). IEEE, 2008, pp. 1536-1540.
-
(2008)
Proceedings of IEEE International Conference on Communications (ICC'2008)
, pp. 1536-1540
-
-
Lei, M.1
Xiao, Y.2
Vrbsky, S.V.3
Li, C.-C.4
Liu, L.5
-
8
-
-
56949095051
-
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
-
M. Lei, Y. Xiao, S. V. Vrbsky, and C.-C. Li, "Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing," Computer Communications, vol. 31, no. 18, pp. 4367-4375, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4367-4375
-
-
Lei, M.1
Xiao, Y.2
Vrbsky, S.V.3
Li, C.-C.4
-
9
-
-
51249086645
-
Secret little functions and codebook for protecting users from password theft
-
IEEE
-
Y. Xiao, C.-C. Li, M. Lei, and S. V. Vrbsky, "Secret little functions and codebook for protecting users from password theft," in Proceedings of IEEE International Conference on Communications (ICC'2008). IEEE, 2008, pp. 1525-1529.
-
(2008)
Proceedings of IEEE International Conference on Communications (ICC'2008)
, pp. 1525-1529
-
-
Xiao, Y.1
Li, C.-C.2
Lei, M.3
Vrbsky, S.V.4
-
10
-
-
0021481768
-
Pass-algorithms: A user validation scheme based on knowledge of secret algorithms
-
J. A. Haskett, "Pass-algorithms: A user validation scheme based on knowledge of secret algorithms," Communications of the ACM, vol. 27, no. 8, pp. 777-781, 1984.
-
(1984)
Communications of the ACM
, vol.27
, Issue.8
, pp. 777-781
-
-
Haskett, J.A.1
-
11
-
-
48649085499
-
Secure input for web applications
-
M. Szydlowski, C. Kruegel, and E. Kirda, "Secure input for web applications," in Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'2007), 2007, pp. 375-384.
-
(2007)
Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'2007)
, pp. 375-384
-
-
Szydlowski, M.1
Kruegel, C.2
Kirda, E.3
-
12
-
-
56649111144
-
Can 'something you know' be saved?
-
Information Security (Proceedings of ISC 2008), ser. T.-C. Wu, Ed., Berlin / Heidelberg: Springer
-
B. Coskun and C. Herley, "Can 'something you know' be saved?" in Information Security (Proceedings of ISC 2008), ser. Lecture Notes in Computer Science, T.-C. Wu, Ed., vol. 5222. Berlin / Heidelberg: Springer, 2008, pp. 421-440.
-
(2008)
Lecture Notes in Computer Science
, vol.5222
, pp. 421-440
-
-
Coskun, B.1
Herley, C.2
-
13
-
-
33751034055
-
Secure human-computer identification (interface) systems against peeping attacks: SecHCI
-
August [Online]. Available: http://www.hooklee.com/Papers/SecHCI-Survey. pdf
-
S. Li and H.-Y. Shum, "Secure human-computer identification (interface) systems against peeping attacks: SecHCI," IACR's Cryptology ePrint Archive: Report 2005/268, http://eprint.iacr.org/2005/268, August 2005. [Online]. Available: http://www.hooklee.com/Papers/SecHCI-Survey.pdf
-
(2005)
IACR's Cryptology EPrint Archive: Report 2005/268
-
-
Li, S.1
Shum, H.-Y.2
-
14
-
-
0042044284
-
Practical human-machine identification over insecure channels
-
X.-Y. Li and S.-H. Teng, "Practical human-machine identification over insecure channels," Journal of Combinatorial Optimization, vol. 3, no. 4, pp. 347-361, 1999.
-
(1999)
Journal of Combinatorial Optimization
, vol.3
, Issue.4
, pp. 347-361
-
-
Li, X.-Y.1
Teng, S.-H.2
-
15
-
-
33751057130
-
Cognitive authentication schemes safe against spyware (short paper)
-
IEEE Computer Society
-
D. Weinshall, "Cognitive authentication schemes safe against spyware (short paper)," in Proceedings of IEEE Symposium on Security and Privacy (S&P'2006). IEEE Computer Society, 2006, pp. 295-300.
-
(2006)
Proceedings of IEEE Symposium on Security and Privacy (S&P'2006)
, pp. 295-300
-
-
Weinshall, D.1
-
16
-
-
34247167942
-
Design and evaluation of a shoulder-surfing resistant graphical password scheme
-
Venezia, Italy: ACM
-
S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget, "Design and evaluation of a shoulder-surfing resistant graphical password scheme," in Proceedings of Working Conference on Advanced Visual Interfaces (AVI'2006). Venezia, Italy: ACM, 2006, pp. 177-184.
-
(2006)
Proceedings of Working Conference on Advanced Visual Interfaces (AVI'2006)
, pp. 177-184
-
-
Wiedenbeck, S.1
Waters, J.2
Sobrado, L.3
Birget, J.-C.4
-
18
-
-
77950846494
-
Human identification through image evaluation using secret predicates
-
Topics in Cryptology - CTRSA 2007, ser. Berlin / Heidelberg: Springer
-
H. Jameel, R. Shaikh, H. Lee, and S. Lee, "Human identification through image evaluation using secret predicates," in Topics in Cryptology - CTRSA 2007, ser. Lecture Notes in Computer Science, vol. 4377. Berlin / Heidelberg: Springer, 2007, pp. 67-84.
-
(2007)
Lecture Notes in Computer Science
, vol.4377
, pp. 67-84
-
-
Jameel, H.1
Shaikh, R.2
Lee, H.3
Lee, S.4
-
19
-
-
70350647479
-
Image-feature based human identification protocols on limited display devices
-
Information Security Applications (Revised Selected Papers of WISA 2008), ser. Berlin / Heidelberg: Springer
-
H. Jameel, R. Shaikh, L. Hung, Y. Wei, S. Raazi, N. Canh, S. Lee, H. Lee, Y. Son, and M. Fernandes, "Image-feature based human identification protocols on limited display devices," in Information Security Applications (Revised Selected Papers of WISA 2008), ser. Lecture Notes in Computer Science, vol. 5379. Berlin / Heidelberg: Springer, 2009, pp. 211-224.
-
(2009)
Lecture Notes in Computer Science
, vol.5379
, pp. 211-224
-
-
Jameel, H.1
Shaikh, R.2
Hung, L.3
Wei, Y.4
Raazi, S.5
Canh, N.6
Lee, S.7
Lee, H.8
Son, Y.9
Fernandes, M.10
-
20
-
-
57749093451
-
Undercover: Authentication usable in front of prying eyes
-
ACM
-
H. Sasamoto, N. Christin, and E. Hayashi, "Undercover: Authentication usable in front of prying eyes," in Proceeding of 26th Annual SIGCHI Conference on Human Factors in Computing Systems (CHI'2008). ACM, 2008, pp. 183-192.
-
(2008)
Proceeding of 26th Annual SIGCHI Conference on Human Factors in Computing Systems (CHI'2008)
, pp. 183-192
-
-
Sasamoto, H.1
Christin, N.2
Hayashi, E.3
-
21
-
-
60649085571
-
PAS: Predicate-based authentication services against powerful passive adversaries
-
IEEE Computer Society
-
X. Bai, W. Gu, S. Chellappan, X. Wang, D. Xuan, and B. Ma, "PAS: predicate-based authentication services against powerful passive adversaries," in Proceedings of Annual Computer Security Applications Conference (ACSAC'2008). IEEE Computer Society, 2008, pp. 433-442.
-
(2008)
Proceedings of Annual Computer Security Applications Conference (ACSAC'2008)
, pp. 433-442
-
-
Bai, X.1
Gu, W.2
Chellappan, S.3
Wang, X.4
Xuan, D.5
Ma, B.6
-
24
-
-
84957372142
-
On the Matsumoto and Imai's human identification scheme
-
Advances in Cryptology - EUROCRYPT' 95, ser. Berlin / Heidelberg: Springer
-
C.-H. Wang, T. Hwang, and J.-J. Tsai, "On the Matsumoto and Imai's human identification scheme," in Advances in Cryptology - EUROCRYPT' 95, ser. Lecture Notes in Computer Science, vol. 921. Berlin / Heidelberg: Springer, 1995, pp. 382-392.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 382-392
-
-
Wang, C.-H.1
Hwang, T.2
Tsai, J.-J.3
-
26
-
-
77950838084
-
On the security of PAS (predicate-based authentication service)
-
IEEE Computer Society
-
S. Li, H. J. Asghar, J. Pieprzyk, A.-R. Sadeghi, R. Schmitz, and H.Wang, "On the security of PAS (predicate-based authentication service)," in Proceedings of 25th Annual Computer Security Applications Conference (ACSAC'2009). IEEE Computer Society, 2009, pp. 209-218.
-
(2009)
Proceedings of 25th Annual Computer Security Applications Conference (ACSAC'2009)
, pp. 209-218
-
-
Li, S.1
Asghar, H.J.2
Pieprzyk, J.3
Sadeghi, A.-R.4
Schmitz, R.5
Wang, H.6
-
27
-
-
70349284581
-
Secure human identification protocols
-
Advances in Cryptology - ASIACRYPT 2001, ser. C. Boyd, Ed., Springer-Verlag, Berlin
-
N. J. Hopper and M. Blum, "Secure human identification protocols," in Advances in Cryptology - ASIACRYPT 2001, ser. Lecture Notes in Computer Science, C. Boyd, Ed., vol. 2248. Springer-Verlag, Berlin, 2001, pp. 52-66.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
28
-
-
85084161493
-
Déjà Vu: A user study using images for authentication
-
USENIX Association
-
R. Dhamija and A. Perrig, "Déjà Vu: A user study using images for authentication," in Proceedings of 9th USENIX Security Symposium. USENIX Association, 2000, pp. 45-58.
-
(2000)
Proceedings of 9th USENIX Security Symposium
, pp. 45-58
-
-
Dhamija, R.1
Perrig, A.2
-
29
-
-
14844314151
-
A PIN-entry method resilient against shoulder surfing
-
ACM
-
V. Roth, K. Richter, and R. Freidinger, "A PIN-entry method resilient against shoulder surfing," in Proceedings of 11th ACM Conference on Computer and Communications Security (CCS'2004). ACM, 2004, pp. 236-245.
-
(2004)
Proceedings of 11th ACM Conference on Computer and Communications Security (CCS'2004)
, pp. 236-245
-
-
Roth, V.1
Richter, K.2
Freidinger, R.3
-
30
-
-
33750566249
-
An association-based graphical password design resistant to shoulder-surfing attack
-
IEEE
-
Z. Li, Q. Sun, Y. Lian, and D. D. Giusto, "An association-based graphical password design resistant to shoulder-surfing attack," in Proceedings of the 2005 IEEE International Conference on Multimedia and Expo (ICME'2005). IEEE, 2005, pp. 245-248.
-
(2005)
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo (ICME'2005)
, pp. 245-248
-
-
Li, Z.1
Sun, Q.2
Lian, Y.3
Giusto, D.D.4
-
31
-
-
34250782167
-
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
-
Pittsburgh, Pennsylvania: ACM
-
F. Tari, A. A. Ozok, and S. H. Holden, "A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords," in Proceedings of 2nd Symposium on Usable Privacy and Security (SOUPS'2006). Pittsburgh, Pennsylvania: ACM, 2006, pp. 56-66.
-
(2006)
Proceedings of 2nd Symposium on Usable Privacy and Security (SOUPS'2006)
, pp. 56-66
-
-
Tari, F.1
Ozok, A.A.2
Holden, S.H.3
-
32
-
-
33744903116
-
A user authentication system using schema of visual memory
-
Biologically Inspired Approaches to Advanced Information Technology (Proceedings of BioADIT 2006), ser. A. J. Ijspeert, T. Masuzawa, and S. Kusumoto, Eds., Berlin / Heidelberg: Springer
-
A. Harada, T. Isarida, T. Mizuno, and M. Nishigaki, "A user authentication system using schema of visual memory," in Biologically Inspired Approaches to Advanced Information Technology (Proceedings of BioADIT 2006), ser. Lecture Notes in Computer Science, A. J. Ijspeert, T. Masuzawa, and S. Kusumoto, Eds., vol. 3853. Berlin / Heidelberg: Springer, 2006, pp. 338-345.
-
(2006)
Lecture Notes in Computer Science
, vol.3853
, pp. 338-345
-
-
Harada, A.1
Isarida, T.2
Mizuno, T.3
Nishigaki, M.4
-
33
-
-
36849043095
-
Graphical passwords & qualitative spatial relations
-
Pittsburgh, Pennsylvania: ACM
-
D. Lin, P. Dunphy, P. Olivier, and J. Yan, "Graphical passwords & qualitative spatial relations," in Proceedings of 3rd Symposium on Usable Privacy and Security (SOUPS'2007). Pittsburgh, Pennsylvania: ACM, 2007, pp. 161-162.
-
(2007)
Proceedings of 3rd Symposium on Usable Privacy and Security (SOUPS'2007)
, pp. 161-162
-
-
Lin, D.1
Dunphy, P.2
Olivier, P.3
Yan, J.4
-
34
-
-
65449162720
-
Use Your Illusion: Secure authentication usable anywhere
-
Pittsburgh, Pennsylvania: ACM
-
E. Hayashi, R. Dhamija, N. Christin, and A. Perrig, "Use Your Illusion: Secure authentication usable anywhere," in Proceedings of 4th Symposium on Usable Privacy and Security (SOUPS'2008). Pittsburgh, Pennsylvania: ACM, 2008, pp. 35-45.
-
(2008)
Proceedings of 4th Symposium on Usable Privacy and Security (SOUPS'2008)
, pp. 35-45
-
-
Hayashi, E.1
Dhamija, R.2
Christin, N.3
Perrig, A.4
-
36
-
-
77955377076
-
New directions in multisensory authentication
-
ACM
-
M. Hasegawa, N. Christin, and E. Hayashi, "New directions in multisensory authentication," in Adjunct Proceedings of the 7th International Conference on Pervasive Computing (Pervasive'2009). ACM, 2009, pp. 103-106.
-
(2009)
Adjunct Proceedings of the 7th International Conference on Pervasive Computing (Pervasive'2009)
, pp. 103-106
-
-
Hasegawa, M.1
Christin, N.2
Hayashi, E.3
-
37
-
-
84892449696
-
VibraPass - Secure authentication based on shared lies
-
ACM
-
A. D. Luca, E. von Zezschwitz, and H. Hußmann, "VibraPass - secure authentication based on shared lies," in Proceedings of 27th International Conference on Human Factors in Computing Systems (CHI'2009). ACM, 2009, pp. 913-916.
-
(2009)
Proceedings of 27th International Conference on Human Factors in Computing Systems (CHI'2009)
, pp. 913-916
-
-
Luca, A.D.1
Von Zezschwitz, E.2
Hußmann, H.3
|