-
1
-
-
0000397421
-
Interference and inhibition in memory retrieval
-
E. Bjork and R. Bjork, editors, Academic Press
-
M. Anderson and J. Neely. Interference and inhibition in memory retrieval. In E. Bjork and R. Bjork, editors, Handbook of Perception and Cognition, pages 237-313. Academic Press, 1996.
-
(1996)
Handbook of Perception and Cognition
, pp. 237-313
-
-
Anderson, M.1
Neely, J.2
-
2
-
-
13444262053
-
R. Spatstat: An R package for analyzing spatial point patterns
-
A. Baddeley and R. Turner. R. Spatstat: An R package for analyzing spatial point patterns. Journal of Statistical Software, 12(6):1-42, 2005.
-
(2005)
Journal of Statistical Software
, vol.12
, Issue.6
, pp. 1-42
-
-
Baddeley, A.1
Turner, R.2
-
3
-
-
84943560970
-
Graphical Passwords as Browser Extension: Implementation and Usability Study
-
K. Bicakci, M. Yuceel, B. Erdeniz, H. Gurbaslar, and N. Atalay. Graphical Passwords as Browser Extension: Implementation and Usability Study. In Third IFIP WG 11.11 International Conference on Trust Management, Purdue University, USA, June 2009.
-
Third IFIP WG 11.11 International Conference on Trust Management, Purdue University, USA, June 2009
-
-
Bicakci, K.1
Yuceel, M.2
Erdeniz, B.3
Gurbaslar, H.4
Atalay, N.5
-
4
-
-
77953111892
-
-
Technical Report TR-09-09, Computer Science
-
R. Biddle, S. Chiasson, and P. C. van Oorschot. Graphical passwords: Learning from the first generation. Technical Report TR-09-09, Computer Science, Carleton University, www.scs.carleton.ca/research/tech-reports, 2009.
-
(2009)
Graphical Passwords: Learning from the First Generation
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.C.3
-
7
-
-
70350567265
-
User interface design affects security: Patterns in click-based graphical passwords
-
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot. User interface design affects security: Patterns in click-based graphical passwords. International Journal of Information Security, 8(6):387-398, 2009.
-
(2009)
International Journal of Information Security
, vol.8
, Issue.6
, pp. 387-398
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.C.4
-
9
-
-
0011354437
-
Serial Learning: Cognition and Behaviour
-
E. Tulving and F. I. Craik, editors, chapter 8. Oxford University Press
-
R. G. Crowder and R. L. Greene. Serial Learning: Cognition and Behaviour. In E. Tulving and F. I. Craik, editors, The Oxford Handbook of Memory, chapter 8. Oxford University Press, 2000.
-
(2000)
The Oxford Handbook of Memory
-
-
Crowder, R.G.1
Greene, R.L.2
-
11
-
-
19944372131
-
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
-
A. De Angeli, L. Coventry, G. Johnson, and K. Renaud. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, 63(1-2):128-152, 2005.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 128-152
-
-
De Angeli, A.1
Coventry, L.2
Johnson, G.3
Renaud, K.4
-
19
-
-
38049011983
-
Click passwords under investigation
-
12th European Symposium On Research In Computer Security (ESORICS), September
-
K. Golofit. Click passwords under investigation. In 12th European Symposium On Research In Computer Security (ESORICS), LNCS 4734, September 2007.
-
(2007)
LNCS
, vol.4734
-
-
Golofit, K.1
-
20
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In 8th USENIX Security Symposium, August 1999.
-
8th USENIX Security Symposium, August 1999
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
22
-
-
0026681952
-
Fitts' law as a research and design tool in human-computer interaction
-
I. S. MacKenzie. Fitts' law as a research and design tool in human-computer interaction. Human-Computer Interaction, 7(1):91-139, 1992.
-
(1992)
Human-Computer Interaction
, vol.7
, Issue.1
, pp. 91-139
-
-
MacKenzie, I.S.1
-
23
-
-
0016997596
-
Pictorial Superiority Effect
-
D. Nelson, V. Reed, and J. Walling. Pictorial Superiority Effect. Journal of Experimental Psychology: Human Learning and Memory, 2(5):523-528, 1976.
-
(1976)
Journal of Experimental Psychology: Human Learning and Memory
, vol.2
, Issue.5
, pp. 523-528
-
-
Nelson, D.1
Reed, V.2
Walling, J.3
-
24
-
-
77955688017
-
Guidelines for designing graphical authentication mechanism interfaces
-
June
-
K. Renaud. Guidelines for designing graphical authentication mechanism interfaces. International Journal of Information and Computer Security, 3(1):60-85, June 2009.
-
(2009)
International Journal of Information and Computer Security
, vol.3
, Issue.1
, pp. 60-85
-
-
Renaud, K.1
-
25
-
-
0035387175
-
Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
-
July
-
M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3):122-131, July 2001.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
27
-
-
77958098545
-
Pass-Go: A proposal to improve the usability of graphical passwords
-
H. Tao and C. Adams. Pass-Go: A proposal to improve the usability of graphical passwords. International Journal of Network Security, 7(2):273-292, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 273-292
-
-
Tao, H.1
Adams, C.2
-
28
-
-
0030496061
-
A nonparametric measure of spatial interaction in point patterns
-
M. van Lieshout and A. Baddeley. A nonparametric measure of spatial interaction in point patterns. Statistica Neerlandica, 50(3):344-361, 1996.
-
(1996)
Statistica Neerlandica
, vol.50
, Issue.3
, pp. 344-361
-
-
Van Lieshout, M.1
Baddeley, A.2
-
29
-
-
77955677817
-
Purely automated attacks on passpoints-style graphical passwords
-
P. C. van Oorschot, A. Salehi-Abari, and J. Thorpe. Purely automated attacks on passpoints-style graphical passwords. IEEE Trans. Info. Forensics and Security, 5(9):393-405, 2010.
-
(2010)
IEEE Trans. Info. Forensics and Security
, vol.5
, Issue.9
, pp. 393-405
-
-
Van Oorschot, P.C.1
Salehi-Abari, A.2
Thorpe, J.3
-
30
-
-
78751535295
-
Exploiting predictability in click-based graphical passwords
-
to appear
-
P. C. van Oorschot and J. Thorpe. Exploiting predictability in click-based graphical passwords. Journal of Computer Security, to appear, 2011.
-
(2011)
Journal of Computer Security
-
-
Van Oorschot, P.C.1
Thorpe, J.2
-
31
-
-
33748943409
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Effects of tolerance and image choice. In 1st Symposium on Usable Privacy and Security (SOUPS), July 2005.
-
1st Symposium on Usable Privacy and Security (SOUPS), July 2005
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
|