-
1
-
-
84857699433
-
Usable mobile security
-
N. Asokan and C. Kuo. Usable mobile security. In ICDCIT, pages 1-6, 2012.
-
(2012)
ICDCIT
, pp. 1-6
-
-
Asokan, N.1
Kuo, C.2
-
3
-
-
84865579756
-
Input finger detection for nonvisual touch screen text entry in perkinput
-
New York, NY, USA, ACM
-
S. Azenkot, J. O. Wobbrock, S. Prasain, and R. E. Ladner. Input finger detection for nonvisual touch screen text entry in perkinput. In Proc. GI'12, New York, NY, USA, 2012. ACM.
-
(2012)
Proc. GI'12
-
-
Azenkot, S.1
Wobbrock, J.O.2
Prasain, S.3
Ladner, R.E.4
-
4
-
-
80054841454
-
On the need for different security methods on mobile phones
-
New York, NY, USA, ACM
-
N. Ben-Asher, N. Kirschnick, H. Sieger, J. Meyer, A. Ben-Oved, and S. Möller. On the need for different security methods on mobile phones. In Proc. MobileHCI'11, pages 465-473, New York, NY, USA, 2011. ACM.
-
(2011)
Proc. MobileHCI'11
, pp. 465-473
-
-
Ben-Asher, N.1
Kirschnick, N.2
Sieger, H.3
Meyer, J.4
Ben-Oved, A.5
Möller, S.6
-
5
-
-
34547321338
-
Dictionary attacks using keyboard acoustic emanations
-
New York, NY, USA, ACM
-
Y. Berger, A. Wool, and A. Yeredor. Dictionary attacks using keyboard acoustic emanations. In Proc. CCS'06, pages 245-254, New York, NY, USA, 2006. ACM.
-
(2006)
Proc. CCS'06
, pp. 245-254
-
-
Berger, Y.1
Wool, A.2
Yeredor, A.3
-
6
-
-
76549127569
-
Evaluating existing audio captchas and an interface optimized for non-visual use
-
New York, NY, USA, ACM
-
J. P. Bigham and A. C. Cavender. Evaluating existing audio captchas and an interface optimized for non-visual use. In Proc. CHI'09, pages 1829-1838, New York, NY, USA, 2009. ACM.
-
(2009)
Proc. CHI'09
, pp. 1829-1838
-
-
Bigham, J.P.1
Cavender, A.C.2
-
7
-
-
80053556855
-
-
Syngress Publishing, Rockland, Massachusetts
-
M. Burnett. Perfect passwords. Syngress Publishing, Rockland, Massachusetts, 2006.
-
(2006)
Perfect Passwords
-
-
Burnett, M.1
-
9
-
-
26844493026
-
Authentication of users on mobile telephones: A survey of attitudes and practices
-
N. Clarke and S. Furnell. Authentication of users on mobile telephones: A survey of attitudes and practices. Computers Security, 24(7):519-527, 2005.
-
(2005)
Computers Security
, vol.24
, Issue.7
, pp. 519-527
-
-
Clarke, N.1
Furnell, S.2
-
10
-
-
85084161493
-
Deja vu: A user study using images for authentication
-
Berkeley, CA, USA, USENIX Association
-
R. Dhamija and A. Perrig. Deja vu: A user study using images for authentication. In Proc. USENIX Security Symposium, pages 45-58, Berkeley, CA, USA, 2000. USENIX Association.
-
(2000)
Proc. USENIX Security Symposium
, pp. 45-58
-
-
Dhamija, R.1
Perrig, A.2
-
11
-
-
78650003586
-
Timing attacks on pin input devices
-
New York, NY, USA, ACM
-
D. Foo Kune and Y. Kim. Timing attacks on pin input devices. In Proc. CCS'10, pages 678-680, New York, NY, USA, 2010. ACM.
-
(2010)
Proc. CCS'10
, pp. 678-680
-
-
Foo Kune, D.1
Kim, Y.2
-
12
-
-
42149131546
-
Developing usable captchas for blind users
-
New York, NY, USA, ACM
-
J. Holman, J. Lazar, J. H. Feng, and J. D'Arcy. Developing usable captchas for blind users. In Proc. ASSETS'07, pages 245-246, New York, NY, USA, 2007. ACM.
-
(2007)
Proc. ASSETS'07
, pp. 245-246
-
-
Holman, J.1
Lazar, J.2
Feng, J.H.3
D'Arcy, J.4
-
14
-
-
84874561028
-
Implicit authentication for mobile devices
-
Berkeley, CA, USA, USENIX Association. 115-122, New York, NY, USA, 2009. ACM
-
M. Jakobsson, E. Shi, P. Golle, and R. Chow. Implicit authentication for mobile devices. In Proc. HotSec'09, pages 9-9, Berkeley, CA, USA, 2009. USENIX Association. 115-122, New York, NY, USA, 2009. ACM.
-
(2009)
Proc. HotSec'09
, pp. 9-9
-
-
Jakobsson, M.1
Shi, E.2
Golle, P.3
Chow, R.4
-
15
-
-
57049108759
-
Human-in-The-loop: Rethinking security in mobile and pervasive systems
-
New York, NY, USA, ACM
-
V. Kostakos. Human-in-the-loop: rethinking security in mobile and pervasive systems. In CHI EA '08, pages 3075-3080, New York, NY, USA, 2008. ACM.
-
(2008)
CHI EA '08
, pp. 3075-3080
-
-
Kostakos, V.1
-
16
-
-
78650637272
-
Toward tactile authentication for blind users
-
New York, NY, USA, ACM
-
R. Kuber and S. Sharma. Toward tactile authentication for blind users. In Proc. ASSETS'10, pages 289-290, New York, NY, USA, 2010. ACM.
-
(2010)
Proc. ASSETS'10
, pp. 289-290
-
-
Kuber, R.1
Sharma, S.2
-
17
-
-
80755144033
-
Rhythmlink: Securely pairing i/o-constrained devices by tapping
-
New York, NY, USA, ACM
-
F. X. Lin, D. Ashbrook, and S. White. Rhythmlink: securely pairing i/o-constrained devices by tapping. In Proc. UIST'11, pages 263-272, New York, NY, USA, 2011. ACM.
-
(2011)
Proc. UIST'11
, pp. 263-272
-
-
Lin, F.X.1
Ashbrook, D.2
White, S.3
-
18
-
-
39149106769
-
On predictive models and user-drawn graphical passwords
-
Jan.
-
P. C. v. Oorschot and J. Thorpe. On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur., 10(4):5:1-5:33, Jan. 2008.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.4
, pp. 51-533
-
-
Oorschot, P.C.V.1
Thorpe, J.2
-
20
-
-
84870688076
-
The secret question is: Why do IT systems use insecure passwords?
-
B. Schneier. The secret question is: why do IT systems use insecure passwords? The Guardian, 2009. http://www.guardian.co.uk/technology/2009/feb/19/ insecurepasswords-conflickerb-worm.
-
(2009)
The Guardian
-
-
Schneier, B.1
-
21
-
-
80955143553
-
Accessibility of captcha methods
-
New York, NY, USA, ACM
-
S. Shirali-Shahreza and M. H. Shirali-Shahreza. Accessibility of captcha methods. In Proc. AISec'11, pages 109-110, New York, NY, USA, 2011. ACM.
-
(2011)
Proc. AISec'11
, pp. 109-110
-
-
Shirali-Shahreza, S.1
Shirali-Shahreza, M.H.2
-
22
-
-
33846307457
-
Graphical passwords: A survey
-
dec
-
X. Suo, Y. Zhu, and G. Owen. Graphical passwords: a survey. In Computer Security Applications Conference, 21st Annual, page 472, dec. 2005.
-
(2005)
Computer Security Applications Conference, 21st Annual
, pp. 472
-
-
Suo, X.1
Zhu, Y.2
Owen, G.3
-
23
-
-
19944381937
-
Passpoints: Design and longitudinal evaluation of a graphical password system
-
Berkeley, CA, USA, USENIX Association
-
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Passpoints: Design and longitudinal evaluation of a graphical password system. In Proc. USENIX Security Symposium, pages 102-127, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
Proc. USENIX Security Symposium
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.3
Brodskiy, A.4
Memon, N.5
-
24
-
-
70450181317
-
Tapsongs: Tapping rhythm-based passwords on a single binary sensor
-
New York, NY, USA, ACM
-
J. O. Wobbrock. Tapsongs: tapping rhythm-based passwords on a single binary sensor. In Proc. UIST'09, pages 93-96, New York, NY, USA, 2009. ACM.
-
(2009)
Proc. UIST'09
, pp. 93-96
-
-
Wobbrock, J.O.1
-
25
-
-
79958126664
-
The aligned rank transform for nonparametric factorial analyses using only anova procedures
-
New York, NY, USA, ACM
-
J. O. Wobbrock, L. Findlater, D. Gergle, and J. J. Higgins. The aligned rank transform for nonparametric factorial analyses using only anova procedures. In Proc. CHI'11, pages 143-146, New York, NY, USA, 2011. ACM.
-
(2011)
Proc. CHI'11
, pp. 143-146
-
-
Wobbrock, J.O.1
Findlater, L.2
Gergle, D.3
Higgins, J.J.4
|