-
1
-
-
1642355176
-
The capacity of visual short-term memory is set both by visual information load and by number of objects
-
Alvarez, G.A. and Cavanagh, P. (2004) 'The capacity of visual short-term memory is set both by visual information load and by number of objects', Psychological Science, Vol. 15, No. 2, pp.106-111.
-
(2004)
Psychological Science
, vol.15
, Issue.2
, pp. 106-111
-
-
Alvarez, G.A.1
Cavanagh, P.2
-
2
-
-
0030708498
-
Analysis of user need in image archives
-
Armitage, L. and Enser, P. (1997) 'Analysis of user need in image archives', Journal of Information Science, Vol. 24, No. 4, pp.287-299.
-
(1997)
Journal of Information Science
, vol.24
, Issue.4
, pp. 287-299
-
-
Armitage, L.1
Enser, P.2
-
3
-
-
0022745884
-
New evidence on the nature of the encoding of action events
-
Bäckman, L., Nilsson, L-G. and Chalom, D. (1986) 'New evidence on the nature of the encoding of action events', Memory & Cognition, Vol. 14, No. 4, pp.339-346.
-
(1986)
Memory & Cognition
, vol.14
, Issue.4
, pp. 339-346
-
-
Bäckman, L.1
Nilsson, L.-G.2
Chalom, D.3
-
4
-
-
0002033743
-
Fifty years of memory for names and faces: A cross-sectional approach
-
Bahrick, H.P., Bahrick, P.O. and Wittlinger, R.P. (1975) 'Fifty years of memory for names and faces: A cross-sectional approach', Journal of Experimental Psychology: General, Vol. 104, No. 1, pp.54-75.
-
(1975)
Journal of Experimental Psychology: General
, vol.104
, Issue.1
, pp. 54-75
-
-
Bahrick, H.P.1
Bahrick, P.O.2
Wittlinger, R.P.3
-
5
-
-
25144477790
-
How much assurance does a PIN provide?
-
H.S. Baird and D.P. Lopretsi Eds, Proceedings HIP, Bethlehem, PA: Springer Verlag, pp
-
Bentley, J. and Mallows, C. (2005) 'How much assurance does a PIN provide?', in H.S. Baird and D.P. Lopretsi (Eds.) Proceedings HIP. LNCS 3517, Bethlehem, PA: Springer Verlag, pp.111-126.
-
(2005)
LNCS
, vol.3517
, pp. 111-126
-
-
Bentley, J.1
Mallows, C.2
-
6
-
-
12244260624
-
Graphicalpassword
-
US Patent 5559961
-
Blonder, G.E. (1996) Graphicalpassword, US Patent 5559961.
-
(1996)
-
-
Blonder, G.E.1
-
7
-
-
0003429117
-
Are passfaces more usable than passwords? A field trial investigation
-
S. McDonald Ed, Springer, pp
-
Brostoff, S. and Sasse, A. (2000) 'Are passfaces more usable than passwords? A field trial investigation', in S. McDonald (Ed.) People and Computers XIV - Usability or Else! Proceedings of HCI 2000, Springer, pp.405-424.
-
(2000)
People and Computers XIV - Usability or Else! Proceedings of HCI 2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, A.2
-
8
-
-
7744227917
-
Generating and remembering passwords
-
Brown, A.S., Bracken, E., Zoccoli, S. and Douglas, K. (2004) 'Generating and remembering passwords', Applied Cognitive Psychology, Vol. 18, No. 6, pp.641-651.
-
(2004)
Applied Cognitive Psychology
, vol.18
, Issue.6
, pp. 641-651
-
-
Brown, A.S.1
Bracken, E.2
Zoccoli, S.3
Douglas, K.4
-
9
-
-
0021101132
-
Recognizing faces
-
Bruce, V. (1983) 'Recognizing faces', Philosophical Transactions of the Royal Society of London, Series B, Biological Sciences, Vol. 302, No. 1110, pp.423-436.
-
(1983)
Philosophical Transactions of the Royal Society of London, Series B, Biological Sciences
, vol.302
, Issue.1110
, pp. 423-436
-
-
Bruce, V.1
-
10
-
-
0008644747
-
Very long-lasting priming in picture naming
-
Cave, C.B. (1997) 'Very long-lasting priming in picture naming', Psychological Science, Vol. 8, No. 4, pp.322-325.
-
(1997)
Psychological Science
, vol.8
, Issue.4
, pp. 322-325
-
-
Cave, C.B.1
-
11
-
-
78650283017
-
Multi-grid graphical password scheme
-
Thessaloniki, Greece, pp
-
Chalkias, K., Alexiadis, A. and Stephanides, G.A. (2006) 'Multi-grid graphical password scheme', Proceedings of the 6th International Conference on Artificial Intelligence and Digital Communications (AIDC Thessaloniki, Greece, pp.80-90.
-
(2006)
Proceedings of the 6th International Conference on Artificial Intelligence and Digital Communications (AIDC
, pp. 80-90
-
-
Chalkias, K.1
Alexiadis, A.2
Stephanides, G.A.3
-
12
-
-
60349118061
-
A second look at the usability of click-based graphical passwords
-
Pittsburgh, USA
-
Chiasson, S., Biddle, R. and van Oorschot, P.C. (2007a) 'A second look at the usability of click-based graphical passwords', Proceedings of the Second Symposium on Usable Privacy and Security SOUPS, Pittsburgh, USA.
-
(2007)
Proceedings of the Second Symposium on Usable Privacy and Security SOUPS
-
-
Chiasson, S.1
Biddle, R.2
van Oorschot, P.C.3
-
13
-
-
38049014958
-
Graphical password authentication using cued click points
-
J. Biskup and J. Lopez Eds, ESORICS, Published in
-
Chiasson, S., van Oorschot, P.C. and Biddle, R. (2007b) 'Graphical password authentication using cued click points', in J. Biskup and J. Lopez (Eds.) ESORICS 2007. Published in LNCS 4734, pp.359-374.
-
(2007)
LNCS
, vol.4734
, pp. 359-374
-
-
Chiasson, S.1
van Oorschot, P.C.2
Biddle, R.3
-
14
-
-
0000365754
-
Conditions for a picture-superiority effect on consumer memory
-
Childers, I.L. and Houston, M.J. (1984) 'Conditions for a picture-superiority effect on consumer memory', Journal of Consumer Research, Vol. 11, pp.643-654.
-
(1984)
Journal of Consumer Research
, vol.11
, pp. 643-654
-
-
Childers, I.L.1
Houston, M.J.2
-
15
-
-
3543041817
-
Scene consistency in object and background perception
-
Davenport, J.L. and Potter, M.C. (2004) 'Scene consistency in object and background perception', Psychological Science, Vol. 15, No. 8, pp.559-564.
-
(2004)
Psychological Science
, vol.15
, Issue.8
, pp. 559-564
-
-
Davenport, J.L.1
Potter, M.C.2
-
16
-
-
85084162383
-
On user choice in graphical password schemes
-
accessed September 2006
-
Davis, D., Monrose, M. and Reiter, M. (2004) 'On user choice in graphical password schemes', 13thUSENIX Security Symposium, http://www.cs.jhu.edu/~fabian (accessed September 2006).
-
(2004)
13thUSENIX Security Symposium
-
-
Davis, D.1
Monrose, M.2
Reiter, M.3
-
17
-
-
0037668484
-
VIP: A visual approach to user authentication
-
ACM Press, pp
-
De Angeli, A., Coutts, M., Coventry, L. and Johnson, G.I. (2002) 'VIP: A visual approach to user authentication', Proceedings of the Working Conference on Advanced Visual Interfaces AVI, ACM Press, pp.316-323.
-
(2002)
Proceedings of the Working Conference on Advanced Visual Interfaces AVI
, pp. 316-323
-
-
De Angeli, A.1
Coutts, M.2
Coventry, L.3
Johnson, G.I.4
-
18
-
-
19944372131
-
Is a picture really worth a thousand words? Reflecting on the usability of graphical authentication systems
-
Nos. 1-2, pp
-
De Angeli, A., Coventry, L., Johnson, G. and Renaud, K. (2005) 'Is a picture really worth a thousand words? Reflecting on the usability of graphical authentication systems', International Journal of Human-Computer Studies, Special issue: HCI Research on Privacy and Security, Vol. 63, Nos. 1-2, pp.128-152.
-
(2005)
International Journal of Human-Computer Studies, Special issue: HCI Research on Privacy and Security
, vol.63
, pp. 128-152
-
-
De Angeli, A.1
Coventry, L.2
Johnson, G.3
Renaud, K.4
-
19
-
-
0021182724
-
Stimulus-selective properties of inferior temporal neurons in the Macaque
-
Desimone, R., Albright, T.D., Gross, C.G. and Bruce, C. (1984) 'Stimulus-selective properties of inferior temporal neurons in the Macaque', Journal of Neuro Science, Vol. 4, No. 8, pp.2051-2062.
-
(1984)
Journal of Neuro Science
, vol.4
, Issue.8
, pp. 2051-2062
-
-
Desimone, R.1
Albright, T.D.2
Gross, C.G.3
Bruce, C.4
-
20
-
-
85084161493
-
Deja vu: A user study using images for authentication
-
Denver, Colorado, pp
-
Dhamija, R. and Perrig, A. (2000) 'Deja vu: A user study using images for authentication', in Proceedings of USENIX Security Symposium, Denver, Colorado, pp.45-58.
-
(2000)
Proceedings of USENIX Security Symposium
, pp. 45-58
-
-
Dhamija, R.1
Perrig, A.2
-
21
-
-
36848999302
-
Modeling user choice in the passpoints graphical password scheme
-
New York, NY: ACM, pp
-
Dirik, A.E., Memon, N. and Birget, J-C. (2007) 'Modeling user choice in the passpoints graphical password scheme', in SOUPS '07: Proceedings of the 3rd Symposium on Usable Privacy and Security, New York, NY: ACM, pp.20-28.
-
(2007)
SOUPS '07: Proceedings of the 3rd Symposium on Usable Privacy and Security
, pp. 20-28
-
-
Dirik, A.E.1
Memon, N.2
Birget, J.-C.3
-
22
-
-
69249127514
-
Do background images improve draw a secret
-
Alexandria, Virginia, USA, pp
-
Dunphy, P. and Yan, J. (2007) 'Do background images improve draw a secret', Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, pp.36-47.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 36-47
-
-
Dunphy, P.1
Yan, J.2
-
23
-
-
84925924082
-
The effects of orienting tasks on recognition, recall and modality confusion of pictures and words
-
Durso, F.T. and Johnson, M.K. (1980) 'The effects of orienting tasks on recognition, recall and modality confusion of pictures and words', Journal of Verbal Learning and Verbal Behavior, Vol. 19, No. 4, pp.416-429.
-
(1980)
Journal of Verbal Learning and Verbal Behavior
, vol.19
, Issue.4
, pp. 416-429
-
-
Durso, F.T.1
Johnson, M.K.2
-
24
-
-
0026195620
-
Preattentive recovery of three-dimensional orientation from line drawings
-
Enns, J.T. and Rensink, R.A. (1991) 'Preattentive recovery of three-dimensional orientation from line drawings', Psychological Review, Vol. 98, No. 3, pp.335-351.
-
(1991)
Psychological Review
, vol.98
, Issue.3
, pp. 335-351
-
-
Enns, J.T.1
Rensink, R.A.2
-
25
-
-
33745916456
-
Gesture signature for ambient intelligence applications: A feasibility study
-
Pervasive Computing: 4th International Conference, PERVASIVE 2006, Dublin, Ireland, pp
-
Farella, E., O'Modhrain, S., Benini, L. and Riccó, B. (2006) 'Gesture signature for ambient intelligence applications: A feasibility study', Pervasive Computing: 4th International Conference, PERVASIVE 2006. LNCS 3968, Dublin, Ireland, pp.288-304.
-
(2006)
LNCS
, vol.3968
, pp. 288-304
-
-
Farella, E.1
O'Modhrain, S.2
Benini, L.3
Riccó, B.4
-
26
-
-
34447503284
-
Assessing the security perceptions of personal internet users
-
Furnell, S., Bryant, P. and Phippen, A.D. (2007) 'Assessing the security perceptions of personal internet users', Computers & Security, Vol. 26, pp.410-417.
-
(2007)
Computers & Security
, vol.26
, pp. 410-417
-
-
Furnell, S.1
Bryant, P.2
Phippen, A.D.3
-
27
-
-
3943091225
-
A long-term trial of alternative user authentication technologies
-
Furnell, S., Papadopoulos, I. and Dowland, P. (2004) 'A long-term trial of alternative user authentication technologies', Information Management & Computer Security, Vol. 12, No. 2, pp.178-190.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.2
, pp. 178-190
-
-
Furnell, S.1
Papadopoulos, I.2
Dowland, P.3
-
28
-
-
34250729756
-
Password management strategies for online accounts
-
New York, NY: ACM Press, pp
-
Gaw, S. and Felten, E.W. (2006) 'Password management strategies for online accounts', SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security, New York, NY: ACM Press, pp.44-55.
-
(2006)
SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 44-55
-
-
Gaw, S.1
Felten, E.W.2
-
29
-
-
33847116000
-
The U.S. treasury tests a new payment mechanism
-
Gelinas, U.I., Jr., Gogan, J.L. and Wade, C. (2003) 'The U.S. treasury tests a new payment mechanism', Journal of Information Systems Education, Vol. 14, No. 3, pp.259-270.
-
(2003)
Journal of Information Systems Education
, vol.14
, Issue.3
, pp. 259-270
-
-
Gelinas Jr., U.I.1
Gogan, J.L.2
Wade, C.3
-
30
-
-
0034232055
-
Searching for one versus two identical targets: When visual search has a memory
-
Gibson, B.S. (2000) 'Searching for one versus two identical targets: when visual search has a memory', Psychological Science, Vol. 11, pp.324-327.
-
(2000)
Psychological Science
, vol.11
, pp. 324-327
-
-
Gibson, B.S.1
-
31
-
-
0034609757
-
Refixation frequency and memory mechanisms in visual search
-
Gilchrist, I.D. and Harvey, M. (2000) 'Refixation frequency and memory mechanisms in visual search', Current Biology, Vol. 10, pp.1209-1212.
-
(2000)
Current Biology
, vol.10
, pp. 1209-1212
-
-
Gilchrist, I.D.1
Harvey, M.2
-
32
-
-
33744903116
-
A user authentication system using schema of visual memory
-
A.J. Ijspeert Ed, BioADIT 2006
-
Harada, A., Isarida, T., Mizuno, T. and Nishigaki, M. (2006) 'A user authentication system using schema of visual memory', in A.J. Ijspeert (Ed.) BioADIT 2006. LNCS 3853, pp.338-345.
-
(2006)
LNCS
, vol.3853
, pp. 338-345
-
-
Harada, A.1
Isarida, T.2
Mizuno, T.3
Nishigaki, M.4
-
33
-
-
33646671233
-
Minimal-feedback hints for remembering passwords
-
May
-
Hertzum, M. (2006) 'Minimal-feedback hints for remembering passwords', Interactions, May, Vol. 13, No. 3, pp.38-40.
-
(2006)
Interactions
, vol.13
, Issue.3
, pp. 38-40
-
-
Hertzum, M.1
-
35
-
-
0242637100
-
Rated familiarity, visual complexity and image agreement and their relation to naming difficulty for items from the Boston naming test
-
Himmanem, S.A., Gentles, K. and Sailor, K. (2003) 'Rated familiarity, visual complexity and image agreement and their relation to naming difficulty for items from the Boston naming test', Journal of Clinical and Experimental Neuropsychology, Vol. 25, No. 8, pp.1178-1185.
-
(2003)
Journal of Clinical and Experimental Neuropsychology
, vol.25
, Issue.8
, pp. 1178-1185
-
-
Himmanem, S.A.1
Gentles, K.2
Sailor, K.3
-
36
-
-
65449162720
-
Use your illusion: Secure authentication usable anywhere
-
Pittsburgh, USA, 23-25 July, pp
-
Hiyashi, E. and Christin, N. (2008) 'Use your illusion: Secure authentication usable anywhere', Symposium on Usable Privacy and Security Systems. SOUPS, Pittsburgh, USA, 23-25 July, pp.35-45.
-
(2008)
Symposium on Usable Privacy and Security Systems. SOUPS
, pp. 35-45
-
-
Hiyashi, E.1
Christin, N.2
-
37
-
-
12244303262
-
A password scheme strongly resistant to spyware
-
Las Vegas, 21-24 June, pp
-
Hong, D., Man, S., Hawes, B. and Mathews, M. (2004) 'A password scheme strongly resistant to spyware', Proceedings of International Conference on Security and Management, Las Vegas, 21-24 June, pp.94-100.
-
(2004)
Proceedings of International Conference on Security and Management
, pp. 94-100
-
-
Hong, D.1
Man, S.2
Hawes, B.3
Mathews, M.4
-
38
-
-
0032490880
-
Visual search has no memory
-
Horowitz, T.S. and Wolfe, J.M. (1998) 'Visual search has no memory', Nature, Vol. 394, pp.575-577.
-
(1998)
Nature
, vol.394
, pp. 575-577
-
-
Horowitz, T.S.1
Wolfe, J.M.2
-
39
-
-
0036689225
-
Eye movements and scene perception: Memory for things observed
-
Irwin, D.E. and Zelinsky, G.J. (2002) 'Eye movements and scene perception: Memory for things observed', Perception and Psychophysics Vol. 64, No. 6, pp.882-895.
-
(2002)
Perception and Psychophysics
, vol.64
, Issue.6
, pp. 882-895
-
-
Irwin, D.E.1
Zelinsky, G.J.2
-
40
-
-
85084161999
-
The design and analysis of graphical passwords
-
August
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K. and Rubin, A.D. (2000) 'The design and analysis of graphical passwords', Proceedings of the 9th USENIX Security Symposium, August, http://www.usenix.org/ publications/library/proceedings/sec2000/technical.html.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
41
-
-
0030191643
-
Cognitive components of picture naming
-
Johnson, C.J., Paivio, A. and Clark, J.M. (1996) 'Cognitive components of picture naming', Psychological Bulletin, Vol. 120, No. 1, pp.113-139.
-
(1996)
Psychological Bulletin
, vol.120
, Issue.1
, pp. 113-139
-
-
Johnson, C.J.1
Paivio, A.2
Clark, J.M.3
-
42
-
-
84897098808
-
Using mnemonic techniques as part of pictorial interface for self-identification of illiterate villagers
-
Bangalore, India
-
Katre, D. (2004) 'Using mnemonic techniques as part of pictorial interface for self-identification of illiterate villagers', Proc I-HCI2004, Bangalore, India.
-
(2004)
Proc I-HCI2004
-
-
Katre, D.1
-
43
-
-
0345618751
-
-
Kent, S.T. and Millett, L.I, Eds, Committee on Authentication Technologies and Their Privacy Implications, National Research Council of the National Academies, Washington, DC: National Academies Press
-
Kent, S.T. and Millett, L.I. (Eds.) (2003) Who Goes There Authentication Through the Eye of Privacy, Committee on Authentication Technologies and Their Privacy Implications, National Research Council of the National Academies, Washington, DC: National Academies Press.
-
(2003)
Who Goes There Authentication Through the Eye of Privacy
-
-
-
44
-
-
13444267403
-
Memory for action events: Findings in neurological patients
-
Knopf, M., Mack, A., Lenel, A. and Ferrante, S. (2005) 'Memory for action events: Findings in neurological patients', Scandinavian Journal of Psychology, Vol. 46, pp.11-19.
-
(2005)
Scandinavian Journal of Psychology
, vol.46
, pp. 11-19
-
-
Knopf, M.1
Mack, A.2
Lenel, A.3
Ferrante, S.4
-
46
-
-
0242578025
-
Home photo content modeling for personalized event-based retrieval
-
Lim, J-H., Tian, Q. and Mulhem, P. (2003) 'Home photo content modeling for personalized event-based retrieval', IEEE Multimedia, Vol. 10, No. 4, pp.28-37.
-
(2003)
IEEE Multimedia
, vol.10
, Issue.4
, pp. 28-37
-
-
Lim, J.-H.1
Tian, Q.2
Mulhem, P.3
-
47
-
-
0002987413
-
Picture memory
-
J. Yuille Ed, Hillsdale, NJ: Lawrence Erlbaum Associates, pp
-
Madigan, S. (1983) 'Picture memory', in J. Yuille (Ed.) Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio, Hillsdale, NJ: Lawrence Erlbaum Associates, pp.43-69.
-
(1983)
Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio
, pp. 43-69
-
-
Madigan, S.1
-
49
-
-
69249140684
-
Safecracker: A visual password authentication scheme
-
P. Isaas, P. Kommers and M. McPherson Eds, Qawra, Malta, pp
-
Maple, C. and Ryan, P. (2005) 'Safecracker: A visual password authentication scheme', in P. Isaas, P. Kommers and M. McPherson (Eds.) IADIS International Conference e-Society 2005, Qawra, Malta, pp.291-298.
-
(2005)
IADIS International Conference e-Society 2005
, pp. 291-298
-
-
Maple, C.1
Ryan, P.2
-
50
-
-
0001842883
-
End-user searching challenges indexing practices in the digital newspaper photo archive
-
Markkula, M. and Sormunen, E. (2000) 'End-user searching challenges indexing practices in the digital newspaper photo archive', Information Retrieval, Vol. 1, No. 4, pp.259-285.
-
(2000)
Information Retrieval
, vol.1
, Issue.4
, pp. 259-285
-
-
Markkula, M.1
Sormunen, E.2
-
51
-
-
35348895703
-
Pictures at the ATM: Exploring the usability of multiple graphical passwords
-
San José, USA, 28 April-3 May, pp
-
Moncur, W. and Leplâtre, G. (2007) 'Pictures at the ATM: Exploring the usability of multiple graphical passwords', Proceedings CHI, San José, USA, 28 April-3 May, pp.887-894.
-
(2007)
Proceedings CHI
, pp. 887-894
-
-
Moncur, W.1
Leplâtre, G.2
-
53
-
-
84955722440
-
Remembering pictures and words: Appearance, significance and name
-
L.S. Cernak and F.I.M. Craik Eds, Hillsdale, NJ: Erlbaum, pp
-
Nelson, D.L. (1979) 'Remembering pictures and words: Appearance, significance and name', in L.S. Cernak and F.I.M. Craik (Eds.) Levels of Processing and Human Memory, Hillsdale, NJ: Erlbaum, pp.45-76.
-
(1979)
Levels of Processing and Human Memory
, pp. 45-76
-
-
Nelson, D.L.1
-
54
-
-
0034718508
-
Reactivation of encoding-related brain activity during memory retrieval
-
Nyberg, L., Habib, R., McIntosh, A.R. and Tulving, E. (2000) 'Reactivation of encoding-related brain activity during memory retrieval', PNAS, Vol. 97, No. 20, pp.11120-11124.
-
(2000)
PNAS
, vol.97
, Issue.20
, pp. 11120-11124
-
-
Nyberg, L.1
Habib, R.2
McIntosh, A.R.3
Tulving, E.4
-
56
-
-
20344391422
-
A gesture-based authentication scheme for untrusted public terminals
-
ACM Press, pp
-
Patel, S.N., Pierce, J.S. and Abowd, G.D. (2004) 'A gesture-based authentication scheme for untrusted public terminals', UIST '04: Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology, ACM Press, pp.157-160.
-
(2004)
UIST '04: Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology
, pp. 157-160
-
-
Patel, S.N.1
Pierce, J.S.2
Abowd, G.D.3
-
57
-
-
0346520200
-
Imagery and recognition: Dissociable measures of memory?
-
Pelizzon, L., Brandimote, M.A. and Favretto, A. (1999) 'Imagery and recognition: Dissociable measures of memory?', European Journal of Cognitive Psychology, Vol. 11, No. 3, pp.429-443.
-
(1999)
European Journal of Cognitive Psychology
, vol.11
, Issue.3
, pp. 429-443
-
-
Pelizzon, L.1
Brandimote, M.A.2
Favretto, A.3
-
58
-
-
3042844145
-
Photographic authentication through untrusted terminals
-
Pering, T., Sundar, M., Light, J. and Want, R. (2003) 'Photographic authentication through untrusted terminals', Security & Privacy, Vol. 2, No. 1, pp.30-36.
-
(2003)
Security & Privacy
, vol.2
, Issue.1
, pp. 30-36
-
-
Pering, T.1
Sundar, M.2
Light, J.3
Want, R.4
-
59
-
-
79959966395
-
A visuo-biometric authentication mechanism for older users
-
Edinburgh, 5-9 September, pp
-
Renaud, K. (2005) 'A visuo-biometric authentication mechanism for older users', Proc British HCI2005, Edinburgh, 5-9 September, pp.167-182.
-
(2005)
Proc British HCI2005
, pp. 167-182
-
-
Renaud, K.1
-
60
-
-
33847401100
-
A process for supporting risk-aware web authentication mechanism choice
-
Special Edition
-
Renaud, K. (2007) 'A process for supporting risk-aware web authentication mechanism choice', Reliability Engineering and System Safety, Special Edition, Vol. 92, No. 9, pp.1204-1217.
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.9
, pp. 1204-1217
-
-
Renaud, K.1
-
61
-
-
77950464849
-
On user involvement in production of images used in visual authentication
-
to appear
-
Renaud, K. (2008) 'On user involvement in production of images used in visual authentication', Journal of Visual Languages and Computing, to appear.
-
(2008)
Journal of Visual Languages and Computing
-
-
Renaud, K.1
-
62
-
-
34250825321
-
Dynahand: Observation-resistant recognition-based web authentication
-
Renaud, K. and Olsen, E. (2007) 'Dynahand: Observation-resistant recognition-based web authentication', IEEE Technology and Society Special issue on Usable Security and Privacy, Vol. 26, No. 2, pp.22-31.
-
(2007)
IEEE Technology and Society Special issue on Usable Security and Privacy
, vol.26
, Issue.2
, pp. 22-31
-
-
Renaud, K.1
Olsen, E.2
-
63
-
-
34547464301
-
Now what was that password again? A more flexible way of identifying and authenticating our seniors', Behaviour and Information Technology, Special issue
-
Renaud, K. and Ramsay, J. (2007) 'Now what was that password again? A more flexible way of identifying and authenticating our seniors', Behaviour and Information Technology, Special issue: Designing Computer Systems for and with Older Users, Vol. 26, No. 4, pp.309-322.
-
(2007)
Designing Computer Systems for and with Older Users
, vol.26
, Issue.4
, pp. 309-322
-
-
Renaud, K.1
Ramsay, J.2
-
64
-
-
9944240263
-
My password is here! Investigating authentication schemes based on visuo-spatial memory
-
Renaud, K.V. and De Angeli, A. (2004) 'My password is here! Investigating authentication schemes based on visuo-spatial memory', Interacting with Computers, Vol. 16, No. 6, pp.1017-1041.
-
(2004)
Interacting with Computers
, vol.16
, Issue.6
, pp. 1017-1041
-
-
Renaud, K.V.1
De Angeli, A.2
-
65
-
-
0002779304
-
Privacy, information technology, and health care
-
Rindfleisch, T.C. (1997) 'Privacy, information technology, and health care', Commun., ACM, Vol. 40, No. 8, pp.92-100.
-
(1997)
Commun., ACM
, vol.40
, Issue.8
, pp. 92-100
-
-
Rindfleisch, T.C.1
-
66
-
-
0038713865
-
How do people manage their digital photographs?
-
New York, NY: ACM Press, pp
-
Rodden, K. and Wood, K.R. (2003) 'How do people manage their digital photographs?', CHI '03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY: ACM Press, pp.409-416.
-
(2003)
CHI '03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 409-416
-
-
Rodden, K.1
Wood, K.R.2
-
67
-
-
14844314151
-
A pin-entry method resilient against shoulder surfing
-
ACM Press, pp
-
Roth, V., Richter, K. and Freidinger, R. (2004) 'A pin-entry method resilient against shoulder surfing', CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security, ACM Press, pp.236-245.
-
(2004)
CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 236-245
-
-
Roth, V.1
Richter, K.2
Freidinger, R.3
-
68
-
-
4143133325
-
How parallel is visual processing in the ventral pathway?
-
Rousselet, G.A., Thorpe, S.J. and Faber-Thorpe, M. (2004) 'How parallel is visual processing in the ventral pathway?', TRENDS in Cognitive Science, Vol. 8, No. 8, pp.363-370.
-
(2004)
TRENDS in Cognitive Science
, vol.8
, Issue.8
, pp. 363-370
-
-
Rousselet, G.A.1
Thorpe, S.J.2
Faber-Thorpe, M.3
-
69
-
-
57749093451
-
Undercover: Authentication usable in front of prying eyes
-
New York, NY: ACM, pp
-
Sasamoto, H., Christin, N. and Hayashi, E. (2008) 'Undercover: authentication usable in front of prying eyes', CHI '08: Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems, New York, NY: ACM, pp.183-192.
-
(2008)
CHI '08: Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems
, pp. 183-192
-
-
Sasamoto, H.1
Christin, N.2
Hayashi, E.3
-
70
-
-
0043168140
-
Effect of target-distractor similarity on FEF visual selection in the absence of the target
-
Sato, T.R., Watanabe, K., Thompson, K.G. and Schall, J.D. (2003) 'Effect of target-distractor similarity on FEF visual selection in the absence of the target', Experimental Brain Research, Vol. 151, pp.356-363.
-
(2003)
Experimental Brain Research
, vol.151
, pp. 356-363
-
-
Sato, T.R.1
Watanabe, K.2
Thompson, K.G.3
Schall, J.D.4
-
71
-
-
0036533804
-
Episodic action monitoring for real objects: An ERP investigation with perform, watch, and imagine action encoding tasks versus a non-action encoding task
-
Senkfor, A.J., Petten, C.V. and Kutas, M. (2002) 'Episodic action monitoring for real objects: An ERP investigation with perform, watch, and imagine action encoding tasks versus a non-action encoding task', Journal of Cognitive Neuroscience, Vol. 14, No. 3, pp.402-419.
-
(2002)
Journal of Cognitive Neuroscience
, vol.14
, Issue.3
, pp. 402-419
-
-
Senkfor, A.J.1
Petten, C.V.2
Kutas, M.3
-
72
-
-
49949146625
-
Recognition memory for words, sentences and pictures
-
Shepard, R.N. (1967) 'Recognition memory for words, sentences and pictures', Journal of Verbal Learning and Verbal Memory, Vol. 6, pp.156-163.
-
(1967)
Journal of Verbal Learning and Verbal Memory
, vol.6
, pp. 156-163
-
-
Shepard, R.N.1
-
74
-
-
85086420444
-
-
Guidelines for designing graphical authentication mechanism interfaces 85
-
Guidelines for designing graphical authentication mechanism interfaces 85
-
-
-
-
75
-
-
34250782167
-
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
-
Pittsburgh, pp
-
Tari, F., Ozok, A.A. and Holden, S.H. (2006) 'A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords', Symposium on Usable Privacy and Security, Pittsburgh, pp.56-66.
-
(2006)
Symposium on Usable Privacy and Security
, pp. 56-66
-
-
Tari, F.1
Ozok, A.A.2
Holden, S.H.3
-
76
-
-
85084163855
-
Graphical dictionaries and the memorable space of graphical passwords
-
Thorpe, J. and van Oorschot, P. (2004) 'Graphical dictionaries and the memorable space of graphical passwords', 13thUSENIX Security Symposium, pp.135-150.
-
(2004)
13thUSENIX Security Symposium
, pp. 135-150
-
-
Thorpe, J.1
van Oorschot, P.2
-
77
-
-
69249139151
-
Using personal photos as pictorial passwords
-
Portland, Oregon, USA, pp
-
Tullis, T.S. and Tedesco, D.P. (2005) 'Using personal photos as pictorial passwords', CHI2005, Portland, Oregon, USA, pp.1841-1844.
-
(2005)
CHI2005
, pp. 1841-1844
-
-
Tullis, T.S.1
Tedesco, D.P.2
-
78
-
-
33746045652
-
EGO: A personalized multimedia management and retrieval tool
-
Urban, J. and Jose, J.M. (2006) 'EGO: A personalized multimedia management and retrieval tool', Int. J. Intell. Syst., Vol. 21, No. 7, pp.725-745.
-
(2006)
Int. J. Intell. Syst
, vol.21
, Issue.7
, pp. 725-745
-
-
Urban, J.1
Jose, J.M.2
-
79
-
-
0028453988
-
Does visual attention select objects or locations?
-
Vecera, S.P. and Farah, M.J. (1994) 'Does visual attention select objects or locations?', Journal of Experimental Psychology: General Vol. 123, No. 2, pp.146-160.
-
(1994)
Journal of Experimental Psychology: General
, vol.123
, Issue.2
, pp. 146-160
-
-
Vecera, S.P.1
Farah, M.J.2
-
80
-
-
33751057130
-
Cognitive authentication schemes safe against spyware (short paper)
-
IEEE Computer Society, Washington, DC, USA, pp
-
Weinshall, D. (2006) 'Cognitive authentication schemes safe against spyware (short paper)', SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, pp.295-300.
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 295-300
-
-
Weinshall, D.1
-
81
-
-
19944375977
-
-
Weinshall, D. and Kirkpatrick, S. (2004) 'Passwords you'll never forget, but can't recall', Proceedings of ACM CHI 2004 Conference on Human Factors in Computing Systems, 2 of Late Breaking Result Papers, pp.1399-1402.
-
Weinshall, D. and Kirkpatrick, S. (2004) 'Passwords you'll never forget, but can't recall', Proceedings of ACM CHI 2004 Conference on Human Factors in Computing Systems, Vol. 2 of Late Breaking Result Papers, pp.1399-1402.
-
-
-
-
82
-
-
0023375092
-
Altering retrieval demands reverses the picture superiority effect
-
Weldon, M.S. and Roediger, H.L. (1987) 'Altering retrieval demands reverses the picture superiority effect', Memory & Cognition, Vol. 15, No. 4, pp.269-280.
-
(1987)
Memory & Cognition
, vol.15
, Issue.4
, pp. 269-280
-
-
Weldon, M.S.1
Roediger, H.L.2
-
83
-
-
19944381937
-
Pass-points: Design and longitudinal evaluation of a graphical password system
-
Wiedenbeck, S., Waters, J., Birget, J-C., Brodskiy, A. and Memon, N. (2005) 'Pass-points: Design and longitudinal evaluation of a graphical password system', Int. J. Hum.-Comput. Stud., Vol. 63, Nos. 1-2, pp.102-127.
-
(2005)
Int. J. Hum.-Comput. Stud
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
84
-
-
34247167942
-
Design and evaluation of a shoulder-surfing resistant graphical password scheme
-
New York, NY: ACM Press, pp
-
Wiedenbeck, S., Waters, J., Sobrado, L. and Birget, J-C. (2006) 'Design and evaluation of a shoulder-surfing resistant graphical password scheme', AVI '06: Proceedings of the Working Conference on Advanced Visual Interfaces, New York, NY: ACM Press, pp.177-184.
-
(2006)
AVI '06: Proceedings of the Working Conference on Advanced Visual Interfaces
, pp. 177-184
-
-
Wiedenbeck, S.1
Waters, J.2
Sobrado, L.3
Birget, J.-C.4
-
85
-
-
84864892381
-
The effect of target specification on objects fixated during visual search
-
Williams, L.G. (1966) 'The effect of target specification on objects fixated during visual search', Perception and Psychophysics, Vol. 1, pp.315-318.
-
(1966)
Perception and Psychophysics
, vol.1
, pp. 315-318
-
-
Williams, L.G.1
-
86
-
-
0037314268
-
Moving towards solutions to some enduring controversies in visual search
-
Wolfe, J.M. (2003) 'Moving towards solutions to some enduring controversies in visual search', TRENDS in Cognitive Sciences, Vol. 7, No. 2, pp.70-76.
-
(2003)
TRENDS in Cognitive Sciences
, vol.7
, Issue.2
, pp. 70-76
-
-
Wolfe, J.M.1
-
87
-
-
33744787989
-
Policies alone do not constitute a sufficient awareness effort
-
Wood, C.C. (1997) 'Policies alone do not constitute a sufficient awareness effort', Computer Fraud & Security, No. 12, pp.14-19.
-
(1997)
Computer Fraud & Security
, Issue.12
, pp. 14-19
-
-
Wood, C.C.1
-
88
-
-
0023816447
-
What facial features activate face neurons in the interferotemporal cortex of the monkey
-
Yamane, S., Kaji, S. and Kawano, K. (1988) 'What facial features activate face neurons in the interferotemporal cortex of the monkey', Experimental Brain Research, Vol. 73, No. 1, pp.209-214.
-
(1988)
Experimental Brain Research
, vol.73
, Issue.1
, pp. 209-214
-
-
Yamane, S.1
Kaji, S.2
Kawano, K.3
-
89
-
-
0038067499
-
Why do actions speak louder than words? Action memory as a variant of encoding manipulations or the result of a special memory system?
-
H.D. Zimmer, R.L. Cohen, M. Guynn, J. Engelkamp, R. Kormi-Nouri and M.N. Foley Eds, New York: Oxford University Press, pp
-
Zimmer, H.D. (2001) 'Why do actions speak louder than words? Action memory as a variant of encoding manipulations or the result of a special memory system?', in H.D. Zimmer, R.L. Cohen, M. Guynn, J. Engelkamp, R. Kormi-Nouri and M.N. Foley (Eds.) Memory for Action: A Distinct Form of Episodic Memory?, New York: Oxford University Press, pp.151-197.
-
(2001)
Memory for Action: A Distinct Form of Episodic Memory
, pp. 151-197
-
-
Zimmer, H.D.1
|