-
1
-
-
33748107711
-
Robust discretization, with an application to graphical passwords
-
J.C. Birget, D. Hong and N. Memon, Robust discretization, with an application to graphical passwords, IEEE Transactions on Information Forensics and Security 1 (2006), 395-399.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, pp. 395-399
-
-
Birget, J.C.1
Hong, D.2
Memon, N.3
-
4
-
-
79960782130
-
-
(Reproduced by permission of) Image ref: 21-35-3, available at:
-
I. Britton (Reproduced by permission of), Image ref: 21-35-3, available at: http://www.freefoto. com.
-
-
-
Britton, I.1
-
5
-
-
84900557334
-
Influencing users towards better passwords: Persuasive cued click-points
-
Liverpool, England
-
S. Chiasson, A. Forget, R. Biddle and P.C. van Oorschot, Influencing users towards better passwords: Persuasive cued click-points, in: Proceedings of HCI, Liverpool, England, 2008.
-
(2008)
Proceedings of HCI
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.C.4
-
6
-
-
70350567265
-
User interface design affects security: Patterns in click-based graphical passwords
-
S. Chiasson, A. Forget, R. Biddle and P.C. van Oorschot, User interface design affects security: Patterns in click-based graphical passwords, International Journal of Information Security 8(6) (2009), 387-398.
-
(2009)
International Journal of Information Security
, vol.8
, Issue.6
, pp. 387-398
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.C.4
-
7
-
-
84964840769
-
Centered discretization with application to graphical passwords
-
San Francisco, CA, USA
-
S. Chiasson, J. Srinivasan, P.C. van Oorschot and R. Biddle, Centered discretization with application to graphical passwords, in: Proceedings of the First USENIX Workshop on Usability, Psychology, and Security (UPSEC), San Francisco, CA, USA, 2008.
-
(2008)
Proceedings of the First USENIX Workshop on Usability, Psychology, and Security (UPSEC)
-
-
Chiasson, S.1
Srinivasan, J.2
Van Oorschot, P.C.3
Biddle, R.4
-
8
-
-
60349118061
-
A second look at the usability of click-based graphical passwords
-
Pittsburgh, PA, USA
-
S. Chiasson, P.C. van Oorschot and R. Biddle, A second look at the usability of click-based graphical passwords, in: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, 2007.
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS)
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
-
9
-
-
77949497300
-
Graphical password authentication using cued click points
-
Dresden, Germany
-
S. Chiasson, P.C. van Oorschot and R. Biddle, Graphical password authentication using cued click points, in: Proceedings of the European Symposium on Research in Computer Security (ESORICS), Dresden, Germany, 2007.
-
(2007)
Proceedings of the European Symposium on Research in Computer Security (ESORICS)
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
-
10
-
-
84981263306
-
The magical number 4 in short-term memory: A reconsideration of mental storage capacity
-
N. Cowan, The magical number 4 in short-term memory: A reconsideration of mental storage capacity, Behavioral and Brain Sciences 24 (2000), 87-185.
-
(2000)
Behavioral and Brain Sciences
, vol.24
, pp. 87-185
-
-
Cowan, N.1
-
11
-
-
85084162383
-
On user choice in graphical password schemes
-
San Diego, CA, USA
-
D. Davis, F. Monrose and M.K. Reiter, On user choice in graphical password schemes, in: Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Davis, D.1
Monrose, F.2
Reiter, M.K.3
-
12
-
-
0003435471
-
-
4th edn, Brooks/Cole Pacific Grove, CA, USA
-
J.L. Devore, Probability and Statistics for Engineering and the Sciences, 4th edn, Brooks/Cole, Pacific Grove, CA, USA, 1995.
-
(1995)
Probability and Statistics for Engineering and the Sciences
-
-
Devore, J.L.1
-
13
-
-
63549135258
-
Modeling user choice in the passpoints graphical password scheme
-
Pittsburgh, PA, USA
-
A. Dirik, N. Memon and J.-C. Birget, Modeling user choice in the passpoints graphical password scheme, in: 3rd Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, 2007.
-
(2007)
3rd Symposium on Usable Privacy and Security (SOUPS)
-
-
Dirik, A.1
Memon, N.2
Birget, J.-C.3
-
14
-
-
9644254228
-
Efficient graph-based image segmentation
-
code available at:
-
P.F. Felzenszwalb and D.P. Huttenlocher, Efficient graph-based image segmentation, International Journal of Computer Vision 59(2) (2004), 167-181, code available at: http://people.cs.uchicago.edu/~pff/segment/.
-
(2004)
International Journal of Computer Vision
, vol.59
, Issue.2
, pp. 167-181
-
-
Felzenszwalb, P.F.1
Huttenlocher, D.P.2
-
15
-
-
79960757334
-
-
FreeImages.com (Photograph Courtesy of)
-
FreeImages.com (Photograph Courtesy of), Image ID: wm-asian-places-047, available at: http:// www.freeimages.com.
-
Image ID: Wm-asian-places-047
-
-
-
16
-
-
79960831079
-
-
FreeImages.com (Photograph Courtesy of), Image ID: wm-recreation-005, available at:
-
FreeImages.com (Photograph Courtesy of), Image ID: wm-recreation-005, available at: http:// www.freeimages.com.
-
-
-
-
17
-
-
79960818177
-
-
Freeimages.co.uk (Photograph Courtesy of), Image ID: paperclips.jpg, available at:
-
Freeimages.co.uk (Photograph Courtesy of), Image ID: paperclips.jpg, available at: http:// www.freeimages.co.uk.
-
-
-
-
18
-
-
79960767436
-
-
Freeimages.co.uk (Photograph Courtesy of), Image ID: pcb04090023.jpg, available at:
-
Freeimages.co.uk (Photograph Courtesy of), Image ID: pcb04090023.jpg, available at: http:// www.freeimages.co.uk.
-
-
-
-
19
-
-
0001466773
-
A combined corner and edge detector
-
University of Manchester, UK
-
C.G. Harris and M.J. Stephens, A combined corner and edge detector, in: Proceedings of the Fourth Alvey Vision Conference, University of Manchester, UK, 1988, pp. 147-151.
-
(1988)
Proceedings of the Fourth Alvey Vision Conference
, pp. 147-151
-
-
Harris, C.G.1
Stephens, M.J.2
-
21
-
-
0032204063
-
A model of saliency-based visual attention for rapid scene analysis
-
L. Itti, C. Koch and E. Niebur, A model of saliency-based visual attention for rapid scene analysis, IEEE Transactions on Pattern Analysis and Machine Intelligence 20(11) (1998), 1254-1259.
-
(1998)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.20
, Issue.11
, pp. 1254-1259
-
-
Itti, L.1
Koch, C.2
Niebur, E.3
-
22
-
-
19944377914
-
Picture password: A visual login technique for mobile devices
-
W. Jansen, S. Gavrilla, V. Korolev, R. Ayers and R. Swanstrom, Picture password: A visual login technique for mobile devices, NIST Report - NISTIR7030, 2003.
-
(2003)
NIST Report - NISTIR7030
-
-
Jansen, W.1
Gavrilla, S.2
Korolev, V.3
Ayers, R.4
Swanstrom, R.5
-
23
-
-
85084161999
-
The design and analysis of graphical passwords
-
Washington, DC, USA
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter and A. Rubin, The design and analysis of graphical passwords, in: Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
25
-
-
0030778788
-
The capacity of visual working memory for features and conjunctions
-
S.J. Luck and E.K Vogel, The capacity of visual working memory for features and conjunctions, Nature 390 (1997), 279-281.
-
(1997)
Nature
, vol.390
, pp. 279-281
-
-
Luck, S.J.1
Vogel, E.K.2
-
26
-
-
84955153370
-
Picture memory
-
J.C. Yuille, ed., Mahwah, NJ, USA, Lawrence Erlbaum Associates
-
S. Madigan, Picture memory, in: Imagery, Memory and Cognition, J.C. Yuille, ed., Lawrence Erlbaum Associates, Mahwah, NJ, USA, 1983, pp. 65-89.
-
(1983)
Imagery, Memory and Cognition
, pp. 65-89
-
-
Madigan, S.1
-
28
-
-
39149113346
-
Graphical passwords
-
L. Cranor and S. Garfinkel, eds, O'Reilly, Sebastopol, CA, Chapter 9
-
F. Monrose and M.K. Reiter, Graphical passwords, in: Security and Usability, L. Cranor and S. Garfinkel, eds, O'Reilly, Sebastopol, CA, 2005, pp. 147-164, Chapter 9.
-
(2005)
Security and Usability
, pp. 147-164
-
-
Monrose, F.1
Reiter, M.K.2
-
29
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
Alexandria, VA, USA
-
A. Narayanan and V. Shmatikov, Fast dictionary attacks on passwords using time-space tradeoff, in: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, USA, 2005, pp. 364-372.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS)
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
30
-
-
79960778376
-
-
Passlogix, available at:, site accessed February 2
-
Passlogix, available at: http://www.passlogix.com, site accessed February 2, 2007.
-
(2007)
-
-
-
31
-
-
0029315746
-
A redrawn Vandenberg and Kuse mental rotations test: Different versions and factors that affect performance
-
M. Peters, B. Laeng, K. Latham, M. Jackson, R. Zaiyouna and C. Richardson, A redrawn Vandenberg and Kuse mental rotations test: Different versions and factors that affect performance, Brain and Cognition 28 (1995), 39-58.
-
(1995)
Brain and Cognition
, vol.28
, pp. 39-58
-
-
Peters, M.1
Laeng, B.2
Latham, K.3
Jackson, M.4
Zaiyouna, R.5
Richardson, C.6
-
32
-
-
79960749368
-
-
Photobucket.com (Photograph Courtesy of), Image ID: 11-12-1-web, available at:
-
Photobucket.com (Photograph Courtesy of), Image ID: 11-12-1-web, available at: http://i26. photobucket.com/albums/c136/hamm239/11-12-1-web.jpg.
-
-
-
-
33
-
-
79960813027
-
-
Real User Corporation About passfaces, available at:, site accessed 24 May
-
Real User Corporation, About passfaces, available at: http://www.realuser.com, site accessed 24 May 2004.
-
(2004)
-
-
-
34
-
-
39349101677
-
What users know and what they actually do
-
available at:
-
S. Riley, What users know and what they actually do, Usability News 8(1) (2006), available at: http://psychology.wichita.edu/surl/usabilitynews/81/ Passwords.htm.
-
(2006)
Usability News
, vol.8
, pp. 1
-
-
Riley, S.1
-
35
-
-
60649098534
-
On purely automated attacks and click-based graphical passwords
-
Anaheim, CA, USA
-
A. Salehi-Abari, J. Thorpe and P.C. van Oorschot, On purely automated attacks and click-based graphical passwords, in: Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC), Anaheim, CA, USA, 2008.
-
(2008)
Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC)
-
-
Salehi-Abari, A.1
Thorpe, J.2
Van Oorschot, P.C.3
-
36
-
-
79960769213
-
-
SFR IT-Engineering site accessed 18 March
-
SFR IT-Engineering, The grafical login solution for your pocket PC - visKey, available at: http:// www.sfr-software.de/cms/EN/pocketpc/viskey/index. html, site accessed 18 March 2007.
-
(2007)
The grafical login solution for your pocket PC - visKey
-
-
-
37
-
-
79960749807
-
-
Siracusa (Reproduced by Permission of)
-
Siracusa (Reproduced by Permission of), John, Clutter: About 130 Windows, available at: http:// arstechnica.com/reviews/os/macosx-10.3.ars/5.
-
John Clutter: About 130 Windows
-
-
-
38
-
-
33846307457
-
Graphical passwords: A survey
-
Tucson, AZ, USA
-
X. Suo, Y. Zhu and G. Scott Owen, Graphical passwords: A survey, in: Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA, 2005.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC)
-
-
Suo, X.1
Zhu, Y.2
Scott Owen, G.3
-
39
-
-
79960811163
-
-
(Personal Photograph by)
-
J. Thorpe (Personal Photograph by), Bee in garden, 2006.
-
(2006)
Bee in garden
-
-
Thorpe, J.1
-
41
-
-
85049042638
-
Human-seeded attacks and exploiting hot spots in graphical passwords
-
Boston, MA, USA
-
J. Thorpe and P.C. van Oorschot, Human-seeded attacks and exploiting hot spots in graphical passwords, in: Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
-
-
Thorpe, J.1
Van Oorschot, P.C.2
-
42
-
-
77955677817
-
Purely automated attacks on PassPoints-style graphical passwords
-
P.C. van Oorschot, A. Salehi-Abari and J. Thorpe, Purely automated attacks on PassPoints-style graphical passwords, IEEE Transactions on Information Forensics and Security (TIFS) 5(3) (2010), 393-405.
-
(2010)
IEEE Transactions on Information Forensics and Security (TIFS)
, vol.5
, Issue.3
, pp. 393-405
-
-
Van Oorschot, P.C.1
Salehi-Abari, A.2
Thorpe, J.3
-
44
-
-
33745852223
-
Peekaboom: A game for locating objects in images
-
Montreal, QC, Canada
-
L. von Ahn, R. Liu and M. Blum, Peekaboom: A game for locating objects in images, in: Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, 2006.
-
(2006)
Conference on Human Factors in Computing Systems (CHI)
-
-
Von Ahn, L.1
Liu, R.2
Blum, M.3
-
45
-
-
35248891741
-
Authentication using graphical passwords: Basic results
-
Las Vegas, NV, USA
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy and N. Memon, Authentication using graphical passwords: Basic results, in: Human-Computer Interaction International (HCII), Las Vegas, NV, USA, 2005.
-
(2005)
Human-Computer Interaction International (HCII)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
46
-
-
33748943409
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
Pittsburgh, PA, USA
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy and N. Memon, Authentication using graphical passwords: Effects of tolerance and image choice, in: Proceedings of the 1st Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, 2005.
-
(2005)
Proceedings of the 1st Symposium on Usable Privacy and Security (SOUPS)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
47
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
Special Issue on HCI Research in Privacy and Security
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy and N. Memon, PassPoints: Design and longitudinal evaluation of a graphical password system, International Journal of Human-Computer Studies 63 (2005), 102-127; Special Issue on HCI Research in Privacy and Security.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
|