-
1
-
-
33846307457
-
Graphical passwords: A survey
-
DOI 10.1109/CSAC.2005.27, 1565273, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
X. Suo, Y. Zhu, G.S. Owen, "Graphical passwords: A survey," 21st Annual Computer Security Applications Conference (ACSAC'05), 2005, pp. 463-472. (Pubitemid 46116502)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 463-472
-
-
Xiaoyuan, S.1
Ying, Z.2
Owen, G.S.3
-
2
-
-
33748107711
-
Graphical passwords based on robust discretization
-
DOI 10.1109/TIFS.2006.879305, 1673401
-
J.C. Birget, D. Hong, and N. Memon, "Graphical Passwords Based on Robust Discretization," IEEE Transactions on Information Forensics and Security 1(3), 2006, pp.395-399. (Pubitemid 44304222)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.3
, pp. 395-399
-
-
Birget, J.-C.1
Hong, D.2
Memon, N.3
-
3
-
-
60349118061
-
A second look at the usability of click-based graphical passwords
-
Pittsburgh, PA, USA July
-
Sonia Chiasson, RoBert Biddle and P.C. van Oorschot, A Second Look at the Usability of Click-Based Graphical Passwords, Symposium On Usable Privacy and Security (SOUPS) 2007, Pittsburgh, PA, USA, pp.18-20, July 2007.
-
(2007)
Symposium on Usable Privacy and Security (SOUPS) 2007
, pp. 18-20
-
-
Chiasson, S.1
Biddle, R.2
Van Oorschot, P.C.3
-
7
-
-
12244303262
-
A password scheme strongly resistant to spyware
-
Las Vergas, NV
-
D. Hong, S. Man, B. Hawes, and M. Mathews, "A password scheme strongly resistant to spyware," in Proceedings of International conference on security and management. Las Vergas, NV, 2004.
-
(2004)
Proceedings of International Conference on Security and Management
-
-
Hong, D.1
Man, S.2
Hawes, B.3
Mathews, M.4
-
8
-
-
79951887739
-
-
[EB/OL]. [2007-11-1]
-
RealUser [EB/OL]. [2007-11-1]. www.realuser.com.
-
-
-
-
9
-
-
33846299042
-
Authenticating mobile device users through image selection
-
W. Jansen, "Authenticating Mobile Device Users Through Image Selection," in Data Security, 2004.
-
(2004)
Data Security
-
-
Jansen, W.1
-
10
-
-
35248815442
-
Awase-E: Image-based authentication for mobile phones using user's favorite images
-
Springer-Verlag GmbH
-
T. Takada and H. Koike, "Awase-E: Image-based Authentication for Mobile Phones using User's Favorite Images," in Human-Computer Interaction with Mobile Devices and Services, vol. 2795 / 2003: Springer-Verlag GmbH, 2003, pp. 347 - 351.
-
(2003)
Human-computer Interaction with Mobile Devices and Services
, vol.2795
, Issue.2003
, pp. 347-351
-
-
Takada, T.1
Koike, H.2
-
11
-
-
79951884222
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proce Symposium, 1999.
-
(1999)
Proce Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
13
-
-
0038049391
-
Doodling our way to better authentication
-
presented at Minneapolis, Minnesota, USA
-
J. Goldberg, J. Hagman, and V. Sazawal, "Doodling Our Way to Better Authentication," presented at Proceedings of Human Factors in Computing Systems (CHI), Minneapolis, Minnesota, USA. 2002.
-
(2002)
Proceedings of Human Factors in Computing Systems (CHI)
-
-
Goldberg, J.1
Hagman, J.2
Sazawal, V.3
-
14
-
-
84956859871
-
A user identification system using signature written with mouse
-
A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): Springer-Verlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441.
-
(1998)
Third Australasian Conference on Information Security and Privacy (ACISP): Springer-verlag Lecture Notes in Computer Science
, Issue.1438
, pp. 403-441
-
-
Syukri, A.F.1
Okamoto, E.2
Mambo, M.3
-
15
-
-
34248342555
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
Carnegie-Mellon University, Pittsburgh
-
S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Effects of tolerance and image choice," in Symposium on Usable Privacy and Security (SOUPS). Carnegie-Mellon University, Pittsburgh, 2005.
-
(2005)
Symposium on Usable Privacy and Security (SOUPS)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
|