-
1
-
-
19944372131
-
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
-
A. D. Angeli, L. Coventry, G. Johnson, and K. Renaud. Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems. Int. J. Hum.-Comput. Stud., 63(1-2):128-152, 2005.
-
(2005)
Int. J. Hum.-Comput. Stud.
, vol.63
, Issue.1-2
, pp. 128-152
-
-
Angeli, A.D.1
Coventry, L.2
Johnson, G.3
Renaud, K.4
-
4
-
-
0022808786
-
A computational approach to edge detection
-
J. Canny. A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell., 8(6):679-698, 1986.
-
(1986)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.8
, Issue.6
, pp. 679-698
-
-
Canny, J.1
-
5
-
-
36849075238
-
A second look at the usability of click-based graphical passwords
-
New York, NY, USA ACM
-
S. Chiasson, R. Biddle, and P. C. van Oorschot. A second look at the usability of click-based graphical passwords. In SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security, pages 1-12, New York, NY, USA, 2007. ACM.
-
(2007)
SOUPS '07: Proceedings of the 3rd Symposium on Usable Privacy and Security
, pp. 1-12
-
-
Chiasson, S.1
Biddle, R.2
Van Oorschot, P.C.3
-
6
-
-
26844493026
-
Authentication of users on mobile telephones - A survey of attitudes and practices
-
N. Clarke and S. Furnell. Authentication of users on mobile telephones - a survey of attitudes and practices. Computers and Security, 24(7):519 - 527, 2005.
-
(2005)
Computers and Security
, vol.24
, Issue.7
, pp. 519-527
-
-
Clarke, N.1
Furnell, S.2
-
7
-
-
85084162383
-
On user choice in graphical password schemes
-
Berkeley, CA, USA USENIX Association
-
D. Davis, F. Monrose, and M. K. Reiter. On user choice in graphical password schemes. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
9
-
-
36848999302
-
Modeling user choice in the PassPoints graphical password scheme
-
New York, NY, USA ACM
-
A. E. Dirik, N. Memon, and J.-C. Birget. Modeling user choice in the PassPoints graphical password scheme. In SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security, pages 20-28, New York, NY, USA, 2007. ACM.
-
(2007)
SOUPS '07: Proceedings of the 3rd Symposium on Usable Privacy and Security
, pp. 20-28
-
-
Dirik, A.E.1
Memon, N.2
Birget, J.-C.3
-
10
-
-
0024696502
-
Visual search and stimulus similarity
-
July
-
J. Duncan and G. W. Humphreys. Visual search and stimulus similarity. Psychological review, 96(3):433-458, July 1989.
-
(1989)
Psychological Review
, vol.96
, Issue.3
, pp. 433-458
-
-
Duncan, J.1
Humphreys, G.W.2
-
11
-
-
65449144442
-
Securing passfaces for description
-
New York, NY, USA ACM
-
P. Dunphy, J. Nicholson, and P. Olivier. Securing Passfaces for Description. In SOUPS '08: Proceedings of the 3rd symposium on Usable privacy and security, New York, NY, USA, 2008. ACM.
-
(2008)
SOUPS '08: Proceedings of the 3rd Symposium on Usable Privacy and Security
-
-
Dunphy, P.1
Nicholson, J.2
Olivier, P.3
-
12
-
-
36849034425
-
Is FacePIN secure and usable?
-
New York, NY, USA ACM
-
P. Dunphy and J. Yan. Is FacePIN secure and usable? In SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security, pages 165-166, New York, NY, USA, 2007. ACM.
-
(2007)
SOUPS '07: Proceedings of the 3rd Symposium on Usable Privacy and Security
, pp. 165-166
-
-
Dunphy, P.1
Yan, J.2
-
13
-
-
84892465782
-
A comprehensive study of frequency, interference, and training of multiple graphical passwords
-
New York, NY, USA ACM
-
K. M. Everitt, T. Bragin, J. Fogarty, and T. Kohno. A comprehensive study of frequency, interference, and training of multiple graphical passwords. In CHI '09: Proceedings of the 27th international conference on Human factors in computing systems, pages 889-898, New York, NY, USA, 2009. ACM.
-
(2009)
CHI '09: Proceedings of the 27th International Conference on Human Factors in Computing Systems
, pp. 889-898
-
-
Everitt, K.M.1
Bragin, T.2
Fogarty, J.3
Kohno, T.4
-
14
-
-
77956244027
-
Mobile phone theft, plastic card and identity fraud: Findings from the 2005/06 british crime survey
-
J. Flatley. Mobile phone theft, plastic card and identity fraud: Findings from the 2005/06 british crime survey. Home Office Statistical Bulletin, 2005.
-
(2005)
Home Office Statistical Bulletin
-
-
Flatley, J.1
-
15
-
-
34548735379
-
Cryptanalysis of a cognitive authentication scheme (extended abstract)
-
Washington, DC, USA IEEE Computer Society
-
P. Golle and D. Wagner. Cryptanalysis of a cognitive authentication scheme (extended abstract). In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 66-70, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 66-70
-
-
Golle, P.1
Wagner, D.2
-
17
-
-
65449162720
-
Use your illusion: Secure authentication usable anywhere
-
New York, NY, USA ACM
-
E. Hayashi, R. Dhamija, N. Christin, and A. Perrig. Use your illusion: secure authentication usable anywhere. In SOUPS '08: Proceedings of the 4th symposium on Usable privacy and security, pages 35-45, New York, NY, USA, 2008. ACM.
-
(2008)
SOUPS '08: Proceedings of the 4th Symposium on Usable Privacy and Security
, pp. 35-45
-
-
Hayashi, E.1
Dhamija, R.2
Christin, N.3
Perrig, A.4
-
18
-
-
57749106553
-
Secure roaming with identity metasystems
-
March
-
L. N. Hoang, P. Laitinen, and N. Asokan. Secure roaming with identity metasystems. In IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, pages 36-47, March 2008.
-
(2008)
IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet
, pp. 36-47
-
-
Hoang, L.N.1
Laitinen, P.2
Asokan, N.3
-
19
-
-
85084161999
-
The design and analysis of graphical passwords
-
Berkeley, CA, USA USENIX Association
-
Ian Jermyn and Alain Mayer and Fabian Monrose and Michael K. Reiter and Aviel D. Rubin. The design and analysis of graphical passwords. In SSYM'99: Proceedings of the 8th Conference on USENIX Security Symposium, Berkeley, CA, USA, 1999. USENIX Association.
-
(1999)
SSYM'99: Proceedings of the 8th Conference on USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
20
-
-
84887058303
-
Can i borrow your phone?: Understanding concerns when sharing mobile phones
-
New York, NY, USA ACM
-
A. K. Karlson, A. B. Brush, and S. Schechter. Can i borrow your phone?: understanding concerns when sharing mobile phones. In CHI '09: Proceedings of the 27th international conference on Human factors in computing systems, pages 1647-1650, New York, NY, USA, 2009. ACM.
-
(2009)
CHI '09: Proceedings of the 27th International Conference on Human Factors in Computing Systems
, pp. 1647-1650
-
-
Karlson, A.K.1
Brush, A.B.2
Schechter, S.3
-
21
-
-
77954017165
-
Multi-touch authentication on tabletops
-
New York, NY, USA ACM
-
D. Kim, P. Dunphy, P. Briggs, J. Hook, J. Nicholson, J. Nicholson, and P. Olivier. Multi-touch authentication on tabletops. In CHI '10: Proceedings of the 28th international conference on Human factors in computing systems, pages 1093-1102, New York, NY, USA, 2010. ACM.
-
(2010)
CHI '10: Proceedings of the 28th International Conference on Human Factors in Computing Systems
, pp. 1093-1102
-
-
Kim, D.1
Dunphy, P.2
Briggs, P.3
Hook, J.4
Nicholson, J.5
Nicholson, J.6
Olivier, P.7
-
22
-
-
35048877939
-
Is it worth the hassle? Exploring the added value of evaluating the usability of context-aware mobile systems in the field
-
Springer-Verlag
-
J. Kjeldskov, M. B. Skov, B. S. Als, and R. T. Høegh. Is it worth the hassle? exploring the added value of evaluating the usability of context-aware mobile systems in the field. In Mobile HCI, pages 61-73. Springer-Verlag, 2004.
-
(2004)
Mobile HCI
, pp. 61-73
-
-
Kjeldskov, J.1
Skov, M.B.2
Als, B.S.3
Høegh, R.T.4
-
23
-
-
0040231044
-
"foiling the cracker" - A survey of, and improvements to, password security
-
D. V. Klein. "foiling the cracker" - A survey of, and improvements to, password security. In Proceedings of the second USENIX Workshop on Security, pages 5-14, 1990.
-
(1990)
Proceedings of the Second USENIX Workshop on Security
, pp. 5-14
-
-
Klein, D.V.1
-
24
-
-
34547176802
-
It's worth the hassle!: The added value of evaluating the usability of mobile systems in the field
-
New York, NY, USA ACM
-
C. M. Nielsen, M. Overgaard, M. B. Pedersen, J. Stage, and S. Stenild. It's worth the hassle!: the added value of evaluating the usability of mobile systems in the field. In NordiCHI '06: Proceedings of the 4th Nordic conference on Human-computer interaction, pages 272-280, New York, NY, USA, 2006. ACM.
-
(2006)
NordiCHI '06: Proceedings of the 4th Nordic Conference on Human-Computer Interaction
, pp. 272-280
-
-
Nielsen, C.M.1
Overgaard, M.2
Pedersen, M.B.3
Stage, J.4
Stenild, S.5
-
25
-
-
77956233796
-
The science behind passfaces
-
Passfaces Corporation
-
Passfaces Corporation. The Science Behind Passfaces. Company white paper.
-
Company White Paper
-
-
-
26
-
-
3042844145
-
Photographic authentication through untrusted terminals
-
T. Pering, M. Sundar, J. Light, and R. Want. Photographic authentication through untrusted terminals. IEEE Pervasive Computing, 2(1):30-36, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 30-36
-
-
Pering, T.1
Sundar, M.2
Light, J.3
Want, R.4
-
27
-
-
34250825321
-
Dynahand: Observation-resistant recognition-based web authentication
-
Summer
-
K. Renaud and E. Olsen. Dynahand: Observation-resistant recognition-based web authentication. Technology and Society Magazine, IEEE, 26(2):22-31, Summer 2007.
-
(2007)
Technology and Society Magazine, IEEE
, vol.26
, Issue.2
, pp. 22-31
-
-
Renaud, K.1
Olsen, E.2
-
28
-
-
38149001555
-
-
Y. Rogers, K. Connelly, L. Tedesco, W. Hazlewood, A. Kurtz, R. Hall, J. Hursey, and T. Toscos. Why it's worth the hassle: The value of in-situ studies when designing ubicomp. pages 336-353, 2007.
-
(2007)
Why It's Worth the Hassle: The Value of In-Situ Studies when Designing Ubicomp
, pp. 336-353
-
-
Rogers, Y.1
Connelly, K.2
Tedesco, L.3
Hazlewood, W.4
Kurtz, A.5
Hall, R.6
Hursey, J.7
Toscos, T.8
-
29
-
-
0035387175
-
Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
-
M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the 'Weakest Link' - a Human/Computer Interaction Approach to Usable and Effective Security. BT Technology Journal, 19(3):122-131, 2001.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
30
-
-
0346384291
-
Controlled and automatic human information processing: I. Detection, search, and attention
-
W. Schneider and R. M. Shiffrin. Controlled and automatic human information processing: I. detection, search, and attention. Psychological Review, 84:1-66, 1977.
-
(1977)
Psychological Review
, vol.84
, pp. 1-66
-
-
Schneider, W.1
Shiffrin, R.M.2
-
32
-
-
77956234274
-
-
last accessed 02/12/2008
-
Sourceforge. 'perceptualdiff' (2008) last accessed 02/12/2008. http://pdiff.sourceforge.net/.
-
(2008)
Perceptualdiff
-
-
-
33
-
-
33846307457
-
Graphical passwords: A survey
-
Washington, DC, USA IEEE Computer Society
-
X. Suo, Y. Zhu, and G. S. Owen. Graphical Passwords: A Survey. In ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 463-472, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 463-472
-
-
Suo, X.1
Zhu, Y.2
Owen, G.S.3
-
34
-
-
50049099712
-
Awase-e: Recognition-based image authentication scheme using users' personal photographs
-
Nov.
-
T. Takada, T. Onuki, and H. Koike. Awase-e: Recognition-based image authentication scheme using users' personal photographs. Innovations in Information Technology, 2006, pages 1-5, Nov. 2006.
-
(2006)
Innovations in Information Technology, 2006
, pp. 1-5
-
-
Takada, T.1
Onuki, T.2
Koike, H.3
-
35
-
-
85049042638
-
Human-seeded attacks and exploiting hot-spots in graphical passwords
-
Aug.6-10
-
J. Thorpe and P. V. Oorschott. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In 16th USENIX Security Symposium, Aug. 6-10, 2007.
-
(2007)
16th USENIX Security Symposium
-
-
Thorpe, J.1
Oorschott, P.V.2
-
36
-
-
69249139151
-
Using personal photos as pictorial passwords
-
New York, NY, USA ACM
-
T. S. Tullis and D. P. Tedesco. Using personal photos as pictorial passwords. In CHI '05: CHI '05 extended abstracts on Human factors in computing systems, pages 1841-1844, New York, NY, USA, 2005. ACM.
-
(2005)
CHI '05: CHI '05 Extended Abstracts on Human Factors in Computing Systems
, pp. 1841-1844
-
-
Tullis, T.S.1
Tedesco, D.P.2
-
37
-
-
38549108892
-
Usability analysis of secure pairing methods
-
Lowlands, Scarborough, Trinidad/Tobago, February Springer
-
E. Uzun, K. Karvonen, and N. Asokan. Usability analysis of secure pairing methods. In Proceedings of the Usable Security 2007 (USEC 07) Workshop, volume 4886 of Lecture Notes in Computer Science, pages 307-324, Lowlands, Scarborough, Trinidad/Tobago, February 2007. Springer.
-
(2007)
Proceedings of the Usable Security 2007 (USEC 07) Workshop, Volume 4886 of Lecture Notes in Computer Science
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
39
-
-
33751057130
-
Cognitive authentication schemes safe against spyware (short paper)
-
Washington, DC, USA IEEE Computer Society
-
D. Weinshall. Cognitive authentication schemes safe against spyware (short paper). In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 295-300, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 295-300
-
-
Weinshall, D.1
-
40
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. PassPoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum.-Comput. Stud., 63(1-2):102-127, 2005.
-
(2005)
Int. J. Hum.-Comput. Stud.
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
|