-
1
-
-
19944372131
-
Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems
-
Angeli, A. D., Coventry, L., Johnson, G., and Renaud, K. Is a picture really worth a thousand words? exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies 63, 1-2 (2005), 128-152.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 128-152
-
-
Angeli, A.D.1
Coventry, L.2
Johnson, G.3
Renaud, K.4
-
3
-
-
77957550802
-
Toward mobile eye-based human-computer interaction
-
Bulling, A., and Gellersen, H. Toward Mobile Eye-Based Human-Computer Interaction. IEEE Pervasive Computing 9, 4 (2010), 8-12.
-
(2010)
IEEE Pervasive Computing
, vol.9
, Issue.4
, pp. 8-12
-
-
Bulling, A.1
Gellersen, H.2
-
4
-
-
84900557334
-
Influencing users towards better passwords: Persuasive cued click-points
-
Chiasson, S., Forget, A., Biddle, R., and van Oorschot, P. C. Influencing users towards better passwords: persuasive cued click-points. In Proceedings of the 22nd British HCI Group Conference on People and Computers (2008), 121-130.
-
(2008)
Proceedings of the 22nd British HCI Group Conference on People and Computers
, pp. 121-130
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.C.4
-
5
-
-
38049014958
-
Graphical password authentication using cued click points
-
Chiasson, S., van Oorschot, P. C., and Biddle, R. Graphical password authentication using cued click points. In Proceedings of the 12th European Symposium on Research in Computer Security (2007), 359-374.
-
(2007)
Proceedings of the 12th European Symposium on Research in Computer Security
, pp. 359-374
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
-
6
-
-
70350716569
-
Look intomy eyes!: Can you guess my password?
-
De Luca, A., Denzel, M., and Hussmann, H. Look intomy eyes!: can you guess my password? In Proceedings of the 5th Symposium on Usable Privacy and Security (2009), 1-12.
-
(2009)
Proceedings of the 5th Symposium on Usable Privacy and Security
, pp. 1-12
-
-
De Luca, A.1
Denzel, M.2
Hussmann, H.3
-
7
-
-
57349195511
-
Evaluation of eye-gaze interaction methods for security enhanced pin-entry
-
De Luca, A., Weiss, R., and Drewes, H. Evaluation of eye-gaze interaction methods for security enhanced pin-entry. In Proceedings of the 19th Australasian Conference on Computer-Human Interaction (2007), 199-202.
-
(2007)
Proceedings of the 19th Australasian Conference on Computer-Human Interaction
, pp. 199-202
-
-
De Luca, A.1
Weiss, R.2
Drewes, H.3
-
8
-
-
84892465782
-
A comprehensive study of frequency, interference, and training of multiple graphical passwords
-
Everitt, K. M., Bragin, T., Fogarty, J., and Kohno, T. A comprehensive study of frequency, interference, and training of multiple graphical passwords. In Proceedings of the 27th SIGCHI International Conference on Human Factors in Computing Systems (2009), 889-898.
-
(2009)
Proceedings of the 27th SIGCHI International Conference on Human Factors in Computing Systems
, pp. 889-898
-
-
Everitt, K.M.1
Bragin, T.2
Fogarty, J.3
Kohno, T.4
-
9
-
-
77953971010
-
Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords
-
Forget, A., Chiasson, S., and Biddle, R. Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. In Proceedings of the 28th SIGCHI International Conference on Human Factors in Computing Systems (2010), 1107-1110.
-
(2010)
Proceedings of the 28th SIGCHI International Conference on Human Factors in Computing Systems
, pp. 1107-1110
-
-
Forget, A.1
Chiasson, S.2
Biddle, R.3
-
10
-
-
65449177711
-
Improving text passwords through persuasion
-
Forget, A., Chiasson, S., van Oorschot, P. C., and Biddle, R. Improving text passwords through persuasion. In Proceedings of the 4th Symposium on Usable Privacy and Security (2008), 1-12.
-
(2008)
Proceedings of the 4th Symposium on Usable Privacy and Security
, pp. 1-12
-
-
Forget, A.1
Chiasson, S.2
Van Oorschot, P.C.3
Biddle, R.4
-
11
-
-
77955637257
-
Computational visual attention systems and their cognitive foundations: A survey
-
Frintrop, S., Rome, E., and Christensen, H. I. Computational visual attention systems and their cognitive foundations: A survey. ACM Transactions on Applied Perception 7, 1 (2010), 1-39.
-
(2010)
ACM Transactions on Applied Perception
, vol.7
, Issue.1
, pp. 1-39
-
-
Frintrop, S.1
Rome, E.2
Christensen, H.I.3
-
13
-
-
84864037603
-
Graph-based visual saliency
-
Harel, J., Koch, C., and Perona, P. Graph-based visual saliency. In Proceedings of the 20th International Conference on Neural Information Processing Systems (2006), 545-552.
-
(2006)
Proceedings of the 20th International Conference on Neural Information Processing Systems
, pp. 545-552
-
-
Harel, J.1
Koch, C.2
Perona, P.3
-
15
-
-
0035286497
-
Computational modelling of visual attention
-
Itti, L., and Koch, C. Computational modelling of visual attention. Nature Reviews Neuroscience 2, 3 (2001), 194-203.
-
(2001)
Nature Reviews Neuroscience
, vol.2
, Issue.3
, pp. 194-203
-
-
Itti, L.1
Koch, C.2
-
16
-
-
0032204063
-
A model of saliency-based visual attention for rapid scene analysis
-
Itti, L., Koch, C., and Niebur, E. A model of saliency-based visual attention for rapid scene analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence 20, 11 (1998), 1254-1259.
-
(1998)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.20
, Issue.11
, pp. 1254-1259
-
-
Itti, L.1
Koch, C.2
Niebur, E.3
-
18
-
-
36849032870
-
Reducing shoulder-surfing by using gaze-based password entry
-
Kumar, M., Garfinkel, T., Boneh, D., and Winograd, T. Reducing shoulder-surfing by using gaze-based password entry. In Proceedings of the 3rd Symposium on Usable Privacy and Security (2007), 13-19.
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security
, pp. 13-19
-
-
Kumar, M.1
Garfinkel, T.2
Boneh, D.3
Winograd, T.4
-
19
-
-
78549276515
-
Guessing click-based graphical passwords by eye tracking
-
LeBlanc, D., Forget, A., and Biddle, R. Guessing click-based graphical passwords by eye tracking. In Proceedings of the 8th International Conference on Privacy Security and Trust (2010), 197-204.
-
(2010)
Proceedings of the 8th International Conference on Privacy Security and Trust
, pp. 197-204
-
-
Leblanc, D.1
Forget, A.2
Biddle, R.3
-
20
-
-
14544294330
-
Gaze based user authentication for personal computer applications
-
Maeder, A. J., Fookes, C. B., and Sridharan, S. Gaze based user authentication for personal computer applications. In Proceedings of International Symposium on Intelligent Multimedia, Video and Speech Processing (2004), 727-730.
-
(2004)
Proceedings of International Symposium on Intelligent Multimedia, Video and Speech Processing
, pp. 727-730
-
-
Maeder, A.J.1
Fookes, C.B.2
Sridharan, S.3
-
22
-
-
33846307457
-
Graphical passwords: A survey
-
Suo, X., Zhu, Y., and Owen, G. S. Graphical passwords: A survey. In Proceedings of the 21st Computer Security Applications Conference (2005), 463-472.
-
(2005)
Proceedings of the 21st Computer Security Applications Conference
, pp. 463-472
-
-
Suo, X.1
Zhu, Y.2
Owen, G.S.3
-
24
-
-
19944381937
-
Passpoints: Design and longitudinal evaluation of a graphical password system
-
Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., and Memon, N. Passpoints: design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63, 1-2 (2005), 102-127.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
|