-
2
-
-
84900557334
-
Influencing users towards better passwords: Persuasive cued click-points
-
Sept.
-
S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, "Influencing Users towards Better Passwords: Persuasive Cued Click-Points," Proc. British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction, Sept. 2008.
-
(2008)
Proc. British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.4
-
3
-
-
74049149728
-
Multiple password interference in text and click-based graphical passwords
-
Nov.
-
S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle, "Multiple Password Interference in Text and Click-Based Graphical Passwords," Proc. ACM Conf. Computer and Comm. Security (CCS), Nov. 2009.
-
(2009)
Proc. ACM Conf. Computer and Comm. Security (CCS)
-
-
Chiasson, S.1
Forget, A.2
Stobert, E.3
Van Oorschot, P.4
Biddle, R.5
-
4
-
-
78751538783
-
Exploring usability effects of increasing security in click-based graphical passwords
-
E. Stobert, A. Forget, S. Chiasson, P. van Oorschot, and R. Biddle, "Exploring Usability Effects of Increasing Security in Click-Based Graphical Passwords," Proc. Ann. Computer Security Applications Conf. (ACSAC), 2010.
-
(2010)
Proc. Ann. Computer Security Applications Conf. (ACSAC)
-
-
Stobert, E.1
Forget, A.2
Chiasson, S.3
Van Oorschot, P.4
Biddle, R.5
-
5
-
-
70350567265
-
User interface design affects security: Patterns in click-based graphical passwords
-
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, "User Interface Design Affects Security: Patterns in Click-Based Graphical Passwords," Int'l J. Information Security, vol. 8, no. 6, pp. 387-398, 2009.
-
(2009)
Int'l J. Information Security
, vol.8
, Issue.6
, pp. 387-398
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.C.4
-
6
-
-
34547294916
-
The memorability and security of passwords
-
L. Cranor and S. Garfinkel, eds., ch. 7, O'Reilly Media
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant, "The Memorability and Security of Passwords," Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, eds., ch. 7, pp. 129-142, O'Reilly Media, 2005.
-
(2005)
Security and Usability: Designing Secure Systems That People Can use
, pp. 129-142
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
7
-
-
38049014958
-
Graphical password authentication using cued click points
-
Sept.
-
S. Chiasson, P. van Oorschot, and R. Biddle, "Graphical Password Authentication Using Cued Click Points," Proc. European Symp. Research in Computer Security (ESORICS), pp. 359-374, Sept. 2007.
-
(2007)
Proc. European Symp. Research in Computer Security (ESORICS)
, pp. 359-374
-
-
Chiasson, S.1
Van Oorschot, P.2
Biddle, R.3
-
9
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
Dec.
-
L. O'Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication," Proc. IEEE, vol. 91, no. 12, pp. 2019-2020, Dec. 2003.
-
(2003)
Proc. IEEE
, vol.91
, Issue.12
, pp. 2019-2020
-
-
O'Gorman, L.1
-
10
-
-
33744779400
-
Biometrics: A tool for information security
-
DOI 10.1109/TIFS.2006.873653
-
A. Jain, A. Ross, and S. Pankanti, "Biometrics: A Tool for Information Security," IEEE Trans. Information Forensics and Security (TIFS), vol. 1, no. 2, pp. 125-143, June 2006. (Pubitemid 43824625)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
11
-
-
0016997596
-
Pictorial superiority effect
-
D. Nelson, V. Reed, and J. Walling, "Pictorial Superiority Effect," J. Experimental Psychology: Human Learning and Memory, vol. 2, no. 5, pp. 523-528, 1976.
-
(1976)
J. Experimental Psychology: Human Learning and Memory
, vol.2
, Issue.5
, pp. 523-528
-
-
Nelson, D.1
Reed, V.2
Walling, J.3
-
12
-
-
84866496149
-
Graphical passwords: Learning from the first twelve years
-
R. Biddle, S. Chiasson, and P. van Oorschot, "Graphical Passwords: Learning from the First Twelve Years," to be published in ACM Computing Surveys, vol. 44, no. 4, 2012.
-
(2012)
To Be Published in ACM Computing Surveys
, vol.44
, Issue.4
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.3
-
13
-
-
19944372131
-
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
-
DOI 10.1016/j.ijhcs.2005.04.020, PII S1071581905000704, HCI Research in Privacy and Security
-
A. De Angeli, L. Coventry, G. Johnson, and K. Renaud, "Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems," Int'l J. Human-Computer Studies, vol. 63, nos. 1/2, pp. 128-152, 2005. (Pubitemid 40753496)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 128-152
-
-
De Angeli, A.1
Coventry, L.2
Johnson, G.3
Renaud, K.4
-
14
-
-
49949133513
-
Availability versus accessibility of information in memory for words
-
E. Tulving and Z. Pearlstone, "Availability versus Accessibility of Information in Memory for Words," J. Verbal Learning and Verbal Behavior, vol. 5, pp. 381-391, 1966.
-
(1966)
J. Verbal Learning and Verbal Behavior
, vol.5
, pp. 381-391
-
-
Tulving, E.1
Pearlstone, Z.2
-
15
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
-
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and Longitudinal Evaluation of a Graphical Password System," Int'l J. Human-Computer Studies, vol. 63, nos. 1/2, pp. 102-127, 2005. (Pubitemid 40753495)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
16
-
-
33748943409
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
July
-
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon, "Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice," Proc. First Symp. Usable Privacy and Security (SOUPS), July 2005.
-
(2005)
Proc. First Symp. Usable Privacy and Security (SOUPS)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.3
Brodskiy, A.4
Memon, N.5
-
21
-
-
77955677817
-
Purely automated attacks on PassPoints-style graphical passwords
-
Sept.
-
P. C. van Oorschot, A. Salehi-Abari, and J. Thorpe, "Purely Automated Attacks on PassPoints-Style Graphical Passwords," IEEE Trans. Information Forensics and Security, vol. 5, no. 3, pp. 393-405, Sept. 2010.
-
(2010)
IEEE Trans. Information Forensics and Security
, vol.5
, Issue.3
, pp. 393-405
-
-
Van Oorschot, P.C.1
Salehi-Abari, A.2
Thorpe, J.3
-
23
-
-
0003328352
-
-
Seeing, K. De Valois, ed., Academic Press
-
J. Wolf, "Visual Attention," Seeing, K. De Valois, ed., pp. 335-386, Academic Press, 2000.
-
(2000)
Visual Attention
, pp. 335-386
-
-
Wolf, J.1
-
27
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern, "Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords," Proc. ACM Conf. Computer and Comm. Security (CCS), 2010.
-
(2010)
Proc. ACM Conf. Computer and Comm. Security (CCS)
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
28
-
-
84883080177
-
[Short paper] the MVP web-based authentication framework
-
LNCS
-
S. Chiasson, C. Deschamps, E. Stobert, M. Hlywa, B. Freitas Machado, A. Forget, N. Wright, G. Chan, and R. Biddle," [Short Paper] The MVP Web-Based Authentication Framework," Proc. Financial Cryptography and Data Security (FC), LNCS, 2012.
-
(2012)
Proc. Financial Cryptography and Data Security (FC)
-
-
Chiasson, S.1
Deschamps, C.2
Stobert, E.3
Hlywa, M.4
Freitas Machado, B.5
Forget, A.6
Wright, N.7
Chan, G.8
Biddle, R.9
-
29
-
-
84964840769
-
Centered discretization with application to graphical passwords
-
Apr.
-
S. Chiasson, J. Srinivasan, R. Biddle, and P. C. van Oorschot, "Centered Discretization with Application to Graphical Passwords," Proc. USENIX Workshop Usability, Psychology, and Security (UPSEC), Apr. 2008.
-
(2008)
Proc. USENIX Workshop Usability, Psychology, and Security (UPSEC)
-
-
Chiasson, S.1
Srinivasan, J.2
Biddle, R.3
Van Oorschot, P.C.4
-
31
-
-
13444262053
-
Spatstat: An R package for analyzing spatial point patterns
-
6
-
A. Baddeley and R. Turner, "Spatstat: An R Package for Analyzing Spatial Point Patterns," J. Statistical Software, vol. 12, no. 6, pp. 1-42, 2005. (Pubitemid 40218000)
-
(2005)
Journal of Statistical Software
, vol.12
, pp. 1-42
-
-
Baddeley, A.1
Turner, R.2
-
32
-
-
0030496061
-
A nonparametric measure of spatial interaction in point patterns
-
M. van Lieshout and A. Baddeley, "A Nonparametric Measure of Spatial Interaction in Point Patterns," Statistica Neerlandica, vol. 50, no. 3, pp. 344-361, 1996.
-
(1996)
Statistica Neerlandica
, vol.50
, Issue.3
, pp. 344-361
-
-
Van Lieshout, M.1
Baddeley, A.2
-
33
-
-
84856251042
-
Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
-
Carleton Univ., Feb.
-
S. Chiasson, E. Stobert, A. Forget, R. Biddle, and P. van Oorschot, "Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism," Technical Report TR-11-03, School of Computer Science, Carleton Univ., Feb. 2011.
-
(2011)
Technical Report TR-11-03, School of Computer Science
-
-
Chiasson, S.1
Stobert, E.2
Forget, A.3
Biddle, R.4
Van Oorschot, P.5
-
34
-
-
78751535295
-
Exploiting predictability in click-based graphical passwords
-
P. C. van Oorschot and J. Thorpe, "Exploiting Predictability in Click-Based Graphical Passwords," J. Computer Security, vol. 19, no. 4, pp. 669-702, 2011.
-
(2011)
J. Computer Security
, vol.19
, Issue.4
, pp. 669-702
-
-
Van Oorschot, P.C.1
Thorpe, J.2
-
40
-
-
65449177711
-
Improving text passwords through persuasion
-
July
-
A. Forget, S. Chiasson, P. van Oorschot, and R. Biddle, "Improving Text Passwords through Persuasion," Proc. Fourth Symp. Usable Privacy and Security (SOUPS), July 2008.
-
(2008)
Proc. Fourth Symp. Usable Privacy and Security (SOUPS)
-
-
Forget, A.1
Chiasson, S.2
Van Oorschot, P.3
Biddle, R.4
|