-
2
-
-
84900557334
-
Influencing users towards better passwords: Persuasive cued click-points
-
Liverpool, U.K.
-
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, "Influencing users towards better passwords: Persuasive cued click-points," in Proc. HCI, British Computer Society, Liverpool, U.K., 2008.
-
(2008)
Proc. HCI, British Computer Society
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.C.4
-
3
-
-
70350567265
-
User interface design affects security: Patterns in click-based graphical passwords
-
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, "User interface design affects security: Patterns in click-based graphical passwords," Int. J. Inf. Security, vol.8, no.6, pp. 387-398, 2009.
-
(2009)
Int. J. Inf. Security
, vol.8
, Issue.6
, pp. 387-398
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.C.4
-
4
-
-
74049149728
-
Multiple password interference in text passwords and click-based graphical passwords
-
Chicago, IL
-
S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle, "Multiple password interference in text passwords and click-based graphical passwords," in 16th ACM Conf. Computer and Communications Security (CCS), Chicago, IL, 2009.
-
(2009)
16th ACM Conf. Computer and Communications Security (CCS)
-
-
Chiasson, S.1
Forget, A.2
Stobert, E.3
Van Oorschot, P.C.4
Biddle, R.5
-
5
-
-
60349118061
-
A second look at the usability of click-based graphical passwords
-
Pittsburgh, PA
-
S. Chiasson, P. C. van Oorschot, and R. Biddle, "A second look at the usability of click-based graphical passwords," in Proc. 3rd Symp. Usable Privacy and Security (SOUPS), Pittsburgh, PA, 2007.
-
(2007)
Proc. 3rd Symp. Usable Privacy and Security (SOUPS)
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
-
6
-
-
77949497300
-
Graphical password authentication using cued click points
-
Dresden, Germany
-
S. Chiasson, P. C. van Oorschot, and R. Biddle, "Graphical password authentication using cued click points," in Proc. Eur. Symp. Research in Computer Security (ESORICS), Dresden, Germany, 2007.
-
(2007)
Proc. Eur. Symp. Research in Computer Security (ESORICS)
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
-
7
-
-
0036565814
-
Mean shift: A robust approach toward feature space analysis
-
May
-
D. Comaniciu and P. Meer, "Mean shift: A robust approach toward feature space analysis," IEEE Trans. Patten Analy. Mach. Intell., vol.24, no.5, pp. 603-619, May 2002.
-
(2002)
IEEE Trans. Patten Analy. Mach. Intell
, vol.24
, Issue.5
, pp. 603-619
-
-
Comaniciu, D.1
Meer, P.2
-
8
-
-
84981263306
-
The magical number 4 in short-term memory: A reconsideration of mental storage capacity
-
N. Cowan, "The magical number 4 in short-term memory: A reconsideration of mental storage capacity," Behavioral Brain Sci., vol.24, pp. 87-185, 2000.
-
(2000)
Behavioral Brain Sci
, vol.24
, pp. 87-185
-
-
Cowan, N.1
-
9
-
-
85084162383
-
On user choice in graphical password schemes
-
San Diego, CA
-
D. Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password schemes," in Proc. 13th USENIX Security Symp., San Diego, CA, 2004.
-
(2004)
Proc. 13th USENIX Security Symp.
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
10
-
-
63549135258
-
Modeling user choice in the PassPoints graphical password scheme
-
Pittsburgh, PA
-
A. Dirik, N. Memon, and J.-C. Birget, "Modeling user choice in the PassPoints graphical password scheme," in 3rd Symp. Usable Privacy and Security (SOUPS), Pittsburgh, PA, 2007.
-
(2007)
3rd Symp. Usable Privacy and Security (SOUPS)
-
-
Dirik, A.1
Memon, N.2
Birget, J.-C.3
-
11
-
-
84892465782
-
A comprehensive study of frequency, interference, and training of multiple graphical passwords
-
Boston, MA
-
K. M. Everitt, T. Bragin, J. Fogarty, and T. Kohno, "A comprehensive study of frequency, interference, and training of multiple graphical passwords," in Proc. 27th Int. Conf. Human Factors in Computing Systems (CHI'09), Boston, MA, 2009.
-
(2009)
Proc. 27th Int. Conf. Human Factors in Computing Systems (CHI'09)
-
-
Everitt, K.M.1
Bragin, T.2
Fogarty, J.3
Kohno, T.4
-
14
-
-
77955688821
-
-
Reproduced by Permission of, [Online]. Available
-
Ian Britton (Reproduced by Permission of). Image Ref: 21-35-43 [Online]. Available: http://www.freefoto.com
-
Image Ref 21-35-43
-
-
Britton, I.1
-
15
-
-
0035286497
-
Computational modeling of visual attention
-
Mar.
-
L. Itti and C. Koch, "Computational modeling of visual attention," Nature Rev. Neurosci., vol.2, no.3, pp. 194-203, Mar. 2001.
-
(2001)
Nature Rev. Neurosci
, vol.2
, Issue.3
, pp. 194-203
-
-
Itti, L.1
Koch, C.2
-
16
-
-
0032204063
-
A model of saliency-based visual attention for rapid scene analysis
-
Nov.
-
L. Itti, C.Koch, and E. Niebur, "A model of saliency-based visual attention for rapid scene analysis," IEEE Trans. Pattern Anal. Mach. Intell., vol.20, no.11, pp. 1254-1259, Nov. 1998.
-
(1998)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.20
, Issue.11
, pp. 1254-1259
-
-
Itti, L.1
Koch, C.2
Niebur, E.3
-
17
-
-
26844503950
-
-
W. Jansen, S. Gavrilla, V. Korolev, R. Ayers, and R. Swanstrom, Picture Password: A Visual Login Technique for Mobile Devices NIST Report-NISTIR7030, 2003.
-
(2003)
Picture Password A Visual Login Technique for Mobile Devices NIST Report-NISTIR7030
-
-
Jansen, W.1
Gavrilla, S.2
Korolev, V.3
Ayers, R.4
Swanstrom, R.5
-
19
-
-
84955153370
-
Picture Memory
-
J C. Yuille, Ed. NJ: Lawrence Erlbaum Assoc.
-
S. Madigan, "Picture Memory," in Imagery, Memory and Cognition, J. C. Yuille, Ed. NJ: Lawrence Erlbaum Assoc., 1983, pp. 65-89.
-
(1983)
Imagery, Memory and Cognition
, pp. 65-89
-
-
Madigan, S.1
-
20
-
-
35348895703
-
Pictures at the ATM: Exploring the usability of multiple graphical passwords
-
New York, ACM Press
-
W. Moncur and G. Leplâtre, "Pictures at the ATM: Exploring the usability of multiple graphical passwords," in Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI'07), New York, 2007, pp. 887-894, ACM Press.
-
(2007)
Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI'07)
, pp. 887-894
-
-
Moncur, W.1
Leplâtre, G.2
-
21
-
-
39149113346
-
Graphical Passwords
-
L. Cranor and S. Garfinkel, Eds. Cambridge, MA: O'Reilly, ch.9
-
F. Monrose and M. K. Reiter, "Graphical Passwords," in Security and Usability, L. Cranor and S. Garfinkel, Eds. Cambridge, MA: O'Reilly, 2005, ch. 9, pp. 147-164.
-
(2005)
Security and Usability
, pp. 147-164
-
-
Monrose, F.1
Reiter, M.K.2
-
22
-
-
9644289372
-
Modeling the influence of task on attention
-
V. Navalpakkam and L. Itti, "Modeling the influence of task on attention," Vison Res., vol.45, pp. 205-231, 2005.
-
(2005)
Vison Res
, vol.45
, pp. 205-231
-
-
Navalpakkam, V.1
Itti, L.2
-
23
-
-
4243110339
-
Top down control of visual attention in object detection
-
A. Oliva, A. Torralba, M. Castelhano, and J. Henderson, "Top down control of visual attention in object detection," J. Vision, vol.3, no.9, pp. 253-256, 2003.
-
(2003)
J. Vision
, vol.3
, Issue.9
, pp. 253-256
-
-
Oliva, A.1
Torralba, A.2
Castelhano, M.3
Henderson, J.4
-
24
-
-
14044256883
-
Empirical validation of the saliency-based model of visual attention
-
N. Ouerhani, R. von Wartburg, H. Hugli, and R. Muri, "Empirical validation of the saliency-based model of visual attention," Electron. Lett. Comput. Vision Image Anal., vol.3, no.1, pp. 13-24, 2004.
-
(2004)
Electron. Lett. Comput. Vision Image Anal
, vol.3
, Issue.1
, pp. 13-24
-
-
Ouerhani, N.1
Von Wartburg, R.2
Hugli, H.3
Muri, R.4
-
25
-
-
77955697974
-
-
Passlogix Feb. 2, [Online]. Available
-
Passlogix Feb. 2, 2007 [Online]. Available: http://www.passlogix.com
-
(2007)
-
-
-
26
-
-
77955688017
-
Guidelines for designing graphical authentication mechanism interfaces
-
K. Renaud, "Guidelines for designing graphical authentication mechanism interfaces.," Int. J. Inf. Comput. Security, vol.3, no.1, pp. 60-85, 2009.
-
(2009)
Int. J. Inf. Comput. Security
, vol.3
, Issue.1
, pp. 60-85
-
-
Renaud, K.1
-
28
-
-
60649098534
-
On purely automated attacks and click-based graphical passwords
-
Anaheim, CA
-
A. Salehi-Abari, J. Thorpe, and P. C. van Oorschot, "On purely automated attacks and click-based graphical passwords," in Proc. 24th Annu. Computer Security Applications Conf. (ACSAC), Anaheim, CA, 2008.
-
(2008)
Proc. 24th Annu. Computer Security Applications Conf. (ACSAC)
-
-
Salehi-Abari, A.1
Thorpe, J.2
Van Oorschot, P.C.3
-
29
-
-
33846307457
-
Graphical passwords: A survey
-
Tucson, AZ
-
X. Suo, Y. Zhu, and G. S. Owen, "Graphical passwords: A survey," in Proc. 21st Annu. Computer Security Applications Conf. (ACSAC), Tucson, AZ, 2005.
-
(2005)
Proc. 21st Annu. Computer Security Applications Conf. (ACSAC)
-
-
Suo, X.1
Zhu, Y.2
Owen, G.S.3
-
30
-
-
77955706963
-
-
Ph.D. thesis, Carleton Univ., Ottawa, Canada
-
J. Thorpe, "On the Predictability and Security of User Choice in Passwords," Ph.D. thesis, Carleton Univ., Ottawa, Canada, 2008.
-
(2008)
On the Predictability and Security of User Choice in Passwords
-
-
Thorpe, J.1
-
31
-
-
85049042638
-
Human-seeded attacks and exploiting hot spots in graphical passwords
-
Boston, MA
-
J. Thorpe and P. C. van Oorschot, "Human-seeded attacks and exploiting hot spots in graphical passwords," in Proc. 16th USENIX Security Symp., Boston, MA, 2007.
-
(2007)
Proc. 16th USENIX Security Symp.
-
-
Thorpe, J.1
Van Oorschot, P.C.2
-
33
-
-
39149106769
-
On predictive models and userdrawn graphical passwords
-
Jan.
-
P. C. van Oorschot and J. Thorpe, "On predictive models and userdrawn graphical passwords," ACM Trans. Inf. Syst. Security, vol.10, no.4, pp. 1-33, Jan. 2008.
-
(2008)
ACM Trans. Inf. Syst. Security
, vol.10
, Issue.4
, pp. 1-33
-
-
Van Oorschot, P.C.1
Thorpe, J.2
-
34
-
-
33750684017
-
Special Issue on Modeling Attention to Salient Proto-Objects
-
D. Walther and C. Koch, 2006 Special Issue on Modeling Attention to Salient Proto-Objects, Neural Netw., vol.19, no.9, pp. 1395-1407, 2006.
-
(2006)
Neural Netw
, vol.19
, Issue.9
, pp. 1395-1407
-
-
Walther, D.1
Koch, C.2
-
35
-
-
35248891741
-
Authentication using graphical passwords: Basic results
-
Las Vegas, NV
-
S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results," in Proc. Human-Computer Interaction Int. (HCII), Las Vegas, NV, 2005.
-
(2005)
Proc. Human-Computer Interaction Int. (HCII)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
36
-
-
33748943409
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
Pittsburgh, PA
-
S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Effects of tolerance and image choice," in Proc. 1st Symp. Usable Privacy and Security (SOUPS), Pittsburgh, PA, 2005.
-
(2005)
Proc. 1st Symp. Usable Privacy and Security (SOUPS)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
37
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," Special Issue on HCI Research in Privacy and Security, Int. J. Human-Comput. Studies, vol.63, pp. 102-127, 2005.
-
(2005)
Special Issue on HCI Research in Privacy and Security, Int. J. Human-Comput. Studies
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
38
-
-
84864888849
-
Guided search 2.0: A revised model of visual search
-
J. M. Wolfe, "Guided search 2.0: A revised model of visual search," Psychonomic Bull. Rev., vol.1, no.2, pp. 202-238, 1994.
-
(1994)
Psychonomic Bull. Rev
, vol.1
, Issue.2
, pp. 202-238
-
-
Wolfe, J.M.1
|