-
1
-
-
33750976116
-
Symmetry, Information and memory patterns
-
F. Attneave, "Symmetry, Information and memory patterns," American Journal of Psychology, vol. 68, pp. 209-222, 1955.
-
(1955)
American Journal of Psychology
, vol.68
, pp. 209-222
-
-
Attneave, F.1
-
2
-
-
84874986206
-
Robust discretization, with an application to graphical passwords
-
Report 2003/168, Jan. 29
-
J. Birget, D. Hong, and N. Memon, "Robust discretization, with an application to graphical passwords," Cryptology ePrint Archive, Report 2003/168, http://eprint.iacr.org/2003/168, Jan. 29, 2006.
-
(2006)
Cryptology ePrint Archiv
-
-
Birget, J.1
Hong, D.2
Memon, N.3
-
4
-
-
0016612492
-
Comprehension and memory for pictures
-
G. H. Bower, M. B. Karlin, and A. Dueck, "Comprehension and memory for pictures," Memory and Cognition, vol. 3, pp. 216-220, 1975.
-
(1975)
Memory and Cognition
, vol.3
, pp. 216-220
-
-
Bower, G.H.1
Karlin, M.B.2
Dueck, A.3
-
5
-
-
0003429117
-
Are PassfacesTM more usable than passwords? A field trial investigation
-
S. Brostoff, and M. A. Sasse, 2000, "Are PassfacesTM more usable than passwords? A field trial investigation," Proceedings of Human Computer Interaction, pp. 405-424, 2000.
-
(2000)
Proceedings of Human Computer Interaction
, vol.2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
6
-
-
85084162383
-
On user choice in graphical password schemes
-
D. Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password schemes," Proceedings of the 13th USENIX Security Symposium, pp. 151-164, 2004
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 151-164
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
8
-
-
0003532271
-
UNIX password security-ten years later
-
LNCS435, Springer-Verlag
-
D. Feldmeier, and P. Karn, "UNIX password security-ten years later," Proceedings of the 19th International Conference on Advances in Cryptology (Crypto '89), LNCS435, pp. 44-63, Springer-Verlag, 1989.
-
(1989)
Proceedings of the 19th International Conference onAdvances in Cryptology (Crypto '89)
, pp. 44-63
-
-
Feldmeier, D.1
Karn, P.2
-
9
-
-
0038049391
-
Doodling our way to better authentication
-
J. Goldberg, J. Hagman, and V. Sazawal, "Doodling our way to better authentication," in Conference on Human Factors and Computing Systems, Poster Session: Student Posters, pp. 868-869, 2002.
-
(2002)
Conference on Human Factors and ComputingSystems, Poster Session: Student Posters
, pp. 868-869
-
-
Goldberg, J.1
Hagman, J.2
Sazawal, V.3
-
10
-
-
0018882393
-
Presentation rate and the representation of briefly glimpsed pictures in memory
-
H. Intraub, "Presentation rate and the representation of briefly glimpsed pictures in memory," Journal of Experimental Psychology: Human Learning and Memory, vol. 6, no. 1, pp. 1-12, 1980.
-
(1980)
Journal of Experimental Psychology: Human Learning and Memory
, vol.6
, Issue.1
, pp. 1-12
-
-
Intraub, H.1
-
11
-
-
26844503950
-
-
NIST Report-NISTIR7030
-
W. Jansen, S. Gavrila, V. Korolev, R. Ayers, and R. Swanstrom, Picture Password: A Visual Login Technique for Mobile Devices, NIST Report-NISTIR7030, 2003.
-
(2003)
Picture Password: A Visual Login Technique for Mobile Devices
-
-
Jansen, W.1
Gavrila, S.2
Korolev, V.3
Ayers, R.4
Swanstrom, R.5
-
12
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The design and analysis of graphical passwords," Proceedings of the 8th USENIX Security Symposium, pp. 1-14, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 1-14
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
13
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
D. Klein, "Foiling the cracker: A survey of, and improvements to, password security," Proceedings of the 2nd USENIX Security Workshop, pp. 5-14, 1990.
-
(1990)
Proceedings of the 2nd USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.1
-
14
-
-
39149113346
-
Graphical passwords, Security and Usability
-
L. Cranor and S. Garfinkel Edit, O'Reilly, Ch. 9
-
F. Monrose, and M. K. Reiter, Graphical passwords, Security and Usability, L. Cranor and S. Garfinkel Edit, O'Reilly, Ch. 9, pp. 147-164, 2005.
-
(2005)
, pp. 147-164
-
-
Monrose, F.1
Reiter, M.K.2
-
15
-
-
0018543411
-
Password security: A case history
-
R. Morris, and K. Thompson, "Password security: A case history," Communications of the ACM, vol. 11, pp. 594-597, 1979.
-
(1979)
Communications of the ACM
, vol.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
16
-
-
21644455927
-
-
Technical Report TR-04-01, Carleton University, Canada
-
D. Nali, and J. Thorpe, Analyzing User Choice In Graphical Passwords, Technical Report TR-04-01, Carleton University, Canada, 2004.
-
(2004)
Analyzing User Choice In Graphical Passwords
-
-
Nali, D.1
Thorpe, J.2
-
18
-
-
84874966716
-
-
Jan. 29
-
Openwall Project, Wordlist, Jan. 29, 2006, http:// www.openwall.com/passwords/wordlists.
-
(2006)
Openwall Project, Wordlist
-
-
-
19
-
-
80054092539
-
Why are pictures easier to recall than words?
-
A. Paivio, T. B. Rogers, and P. C. Smythe, "Why are pictures easier to recall than words?" Psychonomic Science, vol. 11, pp. 137-138, 1968.
-
(1968)
Psychonomic Science
, vol.11
, pp. 137-138
-
-
Paivio, A.1
Rogers, T.B.2
Smythe, P.C.3
-
21
-
-
84874982231
-
-
site accessed on Jan. 29
-
Passlogix, site accessed on Jan. 29, 2006, http: //www.passlogix.com.
-
(2006)
Passlogix
-
-
-
23
-
-
84874997416
-
-
site accessed on Jan. 29
-
SFR, site accessed on Jan. 29, 2006, http:// www.viskey.com/tech.html.
-
(2006)
SFR
-
-
-
24
-
-
7544243600
-
-
Rutgers University, Camden New Jersey 081024
-
L. Sobrado, and J. Birget, Graphical Passwords, The Rutgers Scholar, Rutgers University, Camden New Jersey 081024, 2002.
-
(2002)
Graphical Passwords, The Rutgers Scholar
-
-
Sobrado, L.1
Birget, J.2
-
25
-
-
0015880144
-
Learning 10,000 pictures
-
L. Standing, "Learning 10,000 pictures," Quarterly Journal of Experimental Psychology, vol. 25, pp. 207-222, 1973.
-
(1973)
Quarterly Journal of Experimental Psychology
, vol.25
, pp. 207-222
-
-
Standing, L.1
-
27
-
-
33751181707
-
Password policy: The good, the bad, and the ugly
-
W. C. Summers, and E. Bosworth, "Password policy: The good, the bad, and the ugly," Proceedings of the winter international synposium on Information and communication technologies, pp. 1-6,2004.
-
(2004)
Proceedings of the winter international synposium on Information and communication technologies
, pp. 1-6
-
-
Summers, W.C.1
Bosworth, E.2
-
28
-
-
33846307457
-
Graphical passwords: A survey
-
Dec
-
X. Suo, Y. Zhu, and G. S. Owen, "Graphical passwords: A survey," 21st Annual Computer Security Applications Conference (ACSAC), pp. 463-472, Dec. 5-9, 2005.
-
(2005)
21st Annual Computer Security Applications Conference (ACSAC)
, pp. 463-472
-
-
Suo, X.1
Zhu, Y.2
Owen, G.S.3
-
29
-
-
35248815442
-
Awase-E: Image-based authentication for mobile phones using user's favorite images
-
Springer-Verlag, GmbH
-
T. Takada, and H. Koike, "Awase-E: Image-based authentication for mobile phones using user's favorite images," Human-Computer Interaction with Mobile Devices and Services, vol. 2795, pp. 347-351, Springer-Verlag, GmbH, 2003.
-
(2795)
Human-Computer Interaction with Mobile Devices and Services
, vol.2003
, pp. 347-351
-
-
Takada, T.1
Koike, H.2
-
31
-
-
21644474142
-
Towards secure design choices for implementing graphical passwords
-
Tucson, USA. Dec
-
T. J. Thorpe, and P. C. Van Oorschot, "Towards secure design choices for implementing graphical passwords," Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), pp. 50- 60, Tucson, USA. Dec. 2004.
-
(2004)
Proceedings of the 20thAnnual Computer Security Applications Conference (ACSAC)
, pp. 50-60
-
-
Thorpe, T.J.1
Van Oorschot, P.C.2
-
32
-
-
40949152760
-
Password authentication schemes: Current status and key issues
-
Sep
-
C. S. Tsai, C. C. Lee, and M. S. Hwang, "Password authentication schemes: Current status and key issues," International Journal of Network Security, vol. 3, no. 2, pp. 101-115, Sep. 2006.
-
(2006)
International Journal ofNetwork Security
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
33
-
-
84875002235
-
-
USGO, site accessed on Jan 20
-
USGO, A Very Brief History of Go, site accessed on Jan 20, 2006, http://www.usgo.org/resources/gohistory.asp.
-
(2006)
A Very Brief History of Go
-
-
-
34
-
-
84874983771
-
-
USGO, site accessed on Jan. 20
-
USGO, Top Ten Reasons to Play Go, site accessed on Jan. 20, 2006, http://www.usgo.org/resources/topten.asp.
-
(2006)
Top Ten Reasons to Play Go
-
-
-
35
-
-
81055156698
-
-
Technical Report TR-05-12, Carleton University, Canada
-
P. C. V. Oorschot, and J. Thorpe, On The Security of Graphical Password Schemes, Technical Report TR-05-12, Carleton University, Canada, 2005.
-
(2005)
On The Security of Graphical Password Schemes
-
-
Oorschot, P.C.V.1
Thorpe, J.2
-
36
-
-
19944381937
-
PassPoints: Design and longitu-dinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitu-dinal evaluation of a graphical password system," International Journal of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), vol. 63, pp. 102-127, 2005.
-
(2005)
International Journal of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security)
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.3
Brodskiy, A.4
Memon, N.5
-
38
-
-
0008915230
-
-
Technical Report, no. 500, Computer Laboratory, University of Cambridge
-
J. Yan, A. Blackwell, R. Aanderson, and A.Grant, The Memorability and Security of Passwords - Some Empirical Results, Technical Report, no. 500, Computer Laboratory, University of Cambridge, 2000.
-
(2000)
The Memorability and Security of Passwords - Some Empirical Results
-
-
Yan, J.1
Blackwell, A.2
Aanderson, R.3
Grant, A.4
-
39
-
-
0242708748
-
A note on proactive password checking
-
New Mexico, USA
-
J. Yan, "A note on proactive password checking," ACM New Security Paradigms Workshop, pp. 127- 135, New Mexico, USA, 2001
-
(2001)
ACM New Security Paradigms Workshop
, pp. 127-135
-
-
Yan, J.1
|