메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A closer look at recognition-based graphical passwords on mobile devices

Author keywords

Graphical passwords; Mobile devices; Shoulder surfing

Indexed keywords

ALPHANUMERIC PASSWORDS; APPLICATION DOMAINS; DEPLOYABILITY; DESIGN DECISIONS; FIRST LOOK; GRAPHICAL PASSWORD; HIGH POTENTIAL; HUMAN TESTING; IMAGE PROCESSING TECHNIQUE; LOG-IN DURATIONS; LOW ENTROPY; MEMORY RETENTION; PERSONAL DEVICES; SHOULDER SURFING; USER EVALUATIONS;

EID: 77956257835     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1837110.1837114     Document Type: Conference Paper
Times cited : (38)

References (40)
  • 1
    • 19944372131 scopus 로고    scopus 로고
    • Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
    • A. D. Angeli, L. Coventry, G. Johnson, and K. Renaud. Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems. Int. J. Hum.-Comput. Stud., 63(1-2):128-152, 2005.
    • (2005) Int. J. Hum.-Comput. Stud. , vol.63 , Issue.1-2 , pp. 128-152
    • Angeli, A.D.1    Coventry, L.2    Johnson, G.3    Renaud, K.4
  • 4
    • 0022808786 scopus 로고
    • A computational approach to edge detection
    • J. Canny. A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell., 8(6):679-698, 1986.
    • (1986) IEEE Trans. Pattern Anal. Mach. Intell. , vol.8 , Issue.6 , pp. 679-698
    • Canny, J.1
  • 6
    • 26844493026 scopus 로고    scopus 로고
    • Authentication of users on mobile telephones - A survey of attitudes and practices
    • N. Clarke and S. Furnell. Authentication of users on mobile telephones - a survey of attitudes and practices. Computers and Security, 24(7):519 - 527, 2005.
    • (2005) Computers and Security , vol.24 , Issue.7 , pp. 519-527
    • Clarke, N.1    Furnell, S.2
  • 10
    • 0024696502 scopus 로고
    • Visual search and stimulus similarity
    • July
    • J. Duncan and G. W. Humphreys. Visual search and stimulus similarity. Psychological review, 96(3):433-458, July 1989.
    • (1989) Psychological Review , vol.96 , Issue.3 , pp. 433-458
    • Duncan, J.1    Humphreys, G.W.2
  • 14
    • 77956244027 scopus 로고    scopus 로고
    • Mobile phone theft, plastic card and identity fraud: Findings from the 2005/06 british crime survey
    • J. Flatley. Mobile phone theft, plastic card and identity fraud: Findings from the 2005/06 british crime survey. Home Office Statistical Bulletin, 2005.
    • (2005) Home Office Statistical Bulletin
    • Flatley, J.1
  • 15
    • 34548735379 scopus 로고    scopus 로고
    • Cryptanalysis of a cognitive authentication scheme (extended abstract)
    • Washington, DC, USA IEEE Computer Society
    • P. Golle and D. Wagner. Cryptanalysis of a cognitive authentication scheme (extended abstract). In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 66-70, Washington, DC, USA, 2007. IEEE Computer Society.
    • (2007) SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy , pp. 66-70
    • Golle, P.1    Wagner, D.2
  • 22
    • 35048877939 scopus 로고    scopus 로고
    • Is it worth the hassle? Exploring the added value of evaluating the usability of context-aware mobile systems in the field
    • Springer-Verlag
    • J. Kjeldskov, M. B. Skov, B. S. Als, and R. T. Høegh. Is it worth the hassle? exploring the added value of evaluating the usability of context-aware mobile systems in the field. In Mobile HCI, pages 61-73. Springer-Verlag, 2004.
    • (2004) Mobile HCI , pp. 61-73
    • Kjeldskov, J.1    Skov, M.B.2    Als, B.S.3    Høegh, R.T.4
  • 23
    • 0040231044 scopus 로고
    • "foiling the cracker" - A survey of, and improvements to, password security
    • D. V. Klein. "foiling the cracker" - A survey of, and improvements to, password security. In Proceedings of the second USENIX Workshop on Security, pages 5-14, 1990.
    • (1990) Proceedings of the Second USENIX Workshop on Security , pp. 5-14
    • Klein, D.V.1
  • 25
    • 77956233796 scopus 로고    scopus 로고
    • The science behind passfaces
    • Passfaces Corporation
    • Passfaces Corporation. The Science Behind Passfaces. Company white paper.
    • Company White Paper
  • 26
    • 3042844145 scopus 로고    scopus 로고
    • Photographic authentication through untrusted terminals
    • T. Pering, M. Sundar, J. Light, and R. Want. Photographic authentication through untrusted terminals. IEEE Pervasive Computing, 2(1):30-36, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 30-36
    • Pering, T.1    Sundar, M.2    Light, J.3    Want, R.4
  • 27
    • 34250825321 scopus 로고    scopus 로고
    • Dynahand: Observation-resistant recognition-based web authentication
    • Summer
    • K. Renaud and E. Olsen. Dynahand: Observation-resistant recognition-based web authentication. Technology and Society Magazine, IEEE, 26(2):22-31, Summer 2007.
    • (2007) Technology and Society Magazine, IEEE , vol.26 , Issue.2 , pp. 22-31
    • Renaud, K.1    Olsen, E.2
  • 29
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the 'Weakest Link' - a Human/Computer Interaction Approach to Usable and Effective Security. BT Technology Journal, 19(3):122-131, 2001.
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 30
    • 0346384291 scopus 로고
    • Controlled and automatic human information processing: I. Detection, search, and attention
    • W. Schneider and R. M. Shiffrin. Controlled and automatic human information processing: I. detection, search, and attention. Psychological Review, 84:1-66, 1977.
    • (1977) Psychological Review , vol.84 , pp. 1-66
    • Schneider, W.1    Shiffrin, R.M.2
  • 32
    • 77956234274 scopus 로고    scopus 로고
    • last accessed 02/12/2008
    • Sourceforge. 'perceptualdiff' (2008) last accessed 02/12/2008. http://pdiff.sourceforge.net/.
    • (2008) Perceptualdiff
  • 34
    • 50049099712 scopus 로고    scopus 로고
    • Awase-e: Recognition-based image authentication scheme using users' personal photographs
    • Nov.
    • T. Takada, T. Onuki, and H. Koike. Awase-e: Recognition-based image authentication scheme using users' personal photographs. Innovations in Information Technology, 2006, pages 1-5, Nov. 2006.
    • (2006) Innovations in Information Technology, 2006 , pp. 1-5
    • Takada, T.1    Onuki, T.2    Koike, H.3
  • 35
    • 85049042638 scopus 로고    scopus 로고
    • Human-seeded attacks and exploiting hot-spots in graphical passwords
    • Aug.6-10
    • J. Thorpe and P. V. Oorschott. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In 16th USENIX Security Symposium, Aug. 6-10, 2007.
    • (2007) 16th USENIX Security Symposium
    • Thorpe, J.1    Oorschott, P.V.2
  • 39
    • 33751057130 scopus 로고    scopus 로고
    • Cognitive authentication schemes safe against spyware (short paper)
    • Washington, DC, USA IEEE Computer Society
    • D. Weinshall. Cognitive authentication schemes safe against spyware (short paper). In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 295-300, Washington, DC, USA, 2006. IEEE Computer Society.
    • (2006) SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy , pp. 295-300
    • Weinshall, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.