-
1
-
-
33745723917
-
-
Department of Computer Science, University College London UCL, Doctor of Philosophy Thesis
-
Brostoff, A., Improving password system effectiveness Department of Computer Science, University College London UCL, Doctor of Philosophy Thesis, 2004.
-
(2004)
Improving Password System Effectiveness
-
-
Brostoff, A.1
-
2
-
-
85084162383
-
On User Choice in Graphical Password Schemes
-
Davis, D., Monrose, F. and Reiter, K., On User Choice in Graphical Password Schemes. In Proc 13th USENIX Security Symposium, (2004), 151-164.
-
(2004)
Proc 13th USENIX Security Symposium
, pp. 151-164
-
-
Davis, D.1
Monrose, F.2
Reiter, K.3
-
3
-
-
0037668484
-
VIP: A Visual Approach to User Authentication
-
ACM Press
-
De-Angeli, A., Coutts, M., Coventry, L., Johnson, G., Cameron, D. and Fischer, M., VIP: A Visual Approach to User Authentication. In Proc Advanced Visual Interfaces AVI, ACM Press, (2002), 316-323.
-
(2002)
Proc Advanced Visual Interfaces AVI
, pp. 316-323
-
-
De-Angeli, A.1
Coutts, M.2
Coventry, L.3
Johnson, G.4
Cameron, D.5
Fischer, M.6
-
4
-
-
84869392279
-
Hash Visualization in User Authentication
-
ACM Press
-
Dhamija, R., Hash Visualization in User Authentication. In Proc. (CHI), ACM Press, (2000), 279-280.
-
(2000)
Proc. (CHI)
, pp. 279-280
-
-
Dhamija, R.1
-
5
-
-
61449102807
-
-
Cambridge, Microsoft Research Ltd.
-
Harper, R., Rodden, T., Rogers, Y. and Sellen, A., (Eds.), Being Human: Human-Computer Interaction in the year 2020. Cambridge, Microsoft Research Ltd., 2008.
-
(2008)
Being Human: Human-Computer Interaction in the Year 2020
-
-
Harper, R.1
Rodden, T.2
Rogers, Y.3
Sellen, A.4
-
6
-
-
12844256425
-
Designing and Evaluating Challenge Question Systems
-
Just, M., Designing and Evaluating Challenge Question Systems." In Proc IEEE Security & Privacy: Special Issue on Security and Usability, 2,(5), (2004), 32-39.
-
(2004)
Proc IEEE Security & Privacy: Special Issue on Security and Usability
, vol.2
, Issue.5
, pp. 32-39
-
-
Just, M.1
-
8
-
-
3042844145
-
Photographic Authentication through Untrusted Terminals
-
Pering, T., Sundar, M., Light, J. and Want, R., Photographic Authentication through Untrusted Terminals, Security & Privacy, 2, (1), (2003),30-36.
-
(2003)
Security & Privacy
, vol.2
, Issue.1
, pp. 30-36
-
-
Pering, T.1
Sundar, M.2
Light, J.3
Want, R.4
-
9
-
-
84906919995
-
Internet Authentication Based on Personal History - A Feasibility Test
-
Nosseir, A., Connor, R. and Dunlop, M., Internet Authentication Based on Personal History - A Feasibility Test, Workshop on Customer Focused Mobile Services at WWW 2005, (2005).
-
(2005)
Workshop on Customer Focused Mobile Services at WWW 2005
-
-
Nosseir, A.1
Connor, R.2
Dunlop, M.3
-
10
-
-
34547186056
-
Question-Based Authentication Using Context Data
-
Nosseir, A., Connor, R., Revie, C. and Terzis, S., Question-Based Authentication Using Context Data, ACM Nordic Conference on Human Computer Interaction (NordiCHI 2006), Oslo, Norway, (2006).
-
(2006)
ACM Nordic Conference on Human Computer Interaction (NordiCHI 2006), Oslo, Norway
-
-
Nosseir, A.1
Connor, R.2
Revie, C.3
Terzis, S.4
-
11
-
-
35248815442
-
Awase-E: Image-based authentication for mobile phones using user's favorite images
-
Takada, T and Koike, H., Awase-E: Image-based Authentication for Mobile Phones Using User's Favourite Images, Human-Computer Interaction with Mobile Devices and Services, 2795, (2003). 347-351. (Pubitemid 137632430)
-
(2003)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2795
, pp. 347-351
-
-
Takada, T.1
Koike, H.2
-
12
-
-
60649116908
-
Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice
-
ACM Press
-
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A. and Memon, N., Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. In Proc. Symposium on Usable Privacy and Security (SOUPS), ACM Press, (2005), 1-12.
-
(2005)
Proc. Symposium on Usable Privacy and Security (SOUPS)
, pp. 1-12
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
13
-
-
12844275960
-
Password Memorability and Security: Empirical Results
-
Yan, J., Blackwell, A., Anderson, R. and Grant, A., Password Memorability and Security: Empirical Results, IEEE Security & Privacy, 5,(2), (2004), 25-31.
-
(2004)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
14
-
-
0025545602
-
Cognitive Passwords: The Key to Easy Access Control
-
Zviran, M. and Haga, W., Cognitive Passwords: the Key to Easy Access Control, Computers and Security, 9, (1990),723-736.
-
(1990)
Computers and Security
, vol.9
, pp. 723-736
-
-
Zviran, M.1
Haga, W.2
-
15
-
-
0003369812
-
A Comparison of Password Techniques for Multilevel Authentication Mechanisms
-
Zviran, M. and Haga, W., A Comparison of Password Techniques for Multilevel Authentication Mechanisms, The Computer Journal, 36,(3), (1993), 227-237.
-
(1993)
The Computer Journal
, vol.36
, Issue.3
, pp. 227-237
-
-
Zviran, M.1
Haga, W.2
|