메뉴 건너뛰기




Volumn , Issue , 2012, Pages 159-166

Passchords: Secure multi-touch authentication for blind people

Author keywords

Blind; Mobile devices; Privacy; Security; Touch screens

Indexed keywords

AUTHENTICATION METHODS; BLIND; BLIND PEOPLE; MOBILE DEVICE USERS; MULTI-TOUCH; PASSWORD STRENGTH; PERSONAL IDENTIFICATION NUMBER; SECURITY; SECURITY RISKS; SECURITY THREATS; UNAUTHORIZED USERS;

EID: 84869748119     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2384916.2384945     Document Type: Conference Paper
Times cited : (103)

References (26)
  • 1
    • 84857699433 scopus 로고    scopus 로고
    • Usable mobile security
    • N. Asokan and C. Kuo. Usable mobile security. In ICDCIT, pages 1-6, 2012.
    • (2012) ICDCIT , pp. 1-6
    • Asokan, N.1    Kuo, C.2
  • 3
    • 84865579756 scopus 로고    scopus 로고
    • Input finger detection for nonvisual touch screen text entry in perkinput
    • New York, NY, USA, ACM
    • S. Azenkot, J. O. Wobbrock, S. Prasain, and R. E. Ladner. Input finger detection for nonvisual touch screen text entry in perkinput. In Proc. GI'12, New York, NY, USA, 2012. ACM.
    • (2012) Proc. GI'12
    • Azenkot, S.1    Wobbrock, J.O.2    Prasain, S.3    Ladner, R.E.4
  • 5
    • 34547321338 scopus 로고    scopus 로고
    • Dictionary attacks using keyboard acoustic emanations
    • New York, NY, USA, ACM
    • Y. Berger, A. Wool, and A. Yeredor. Dictionary attacks using keyboard acoustic emanations. In Proc. CCS'06, pages 245-254, New York, NY, USA, 2006. ACM.
    • (2006) Proc. CCS'06 , pp. 245-254
    • Berger, Y.1    Wool, A.2    Yeredor, A.3
  • 6
    • 76549127569 scopus 로고    scopus 로고
    • Evaluating existing audio captchas and an interface optimized for non-visual use
    • New York, NY, USA, ACM
    • J. P. Bigham and A. C. Cavender. Evaluating existing audio captchas and an interface optimized for non-visual use. In Proc. CHI'09, pages 1829-1838, New York, NY, USA, 2009. ACM.
    • (2009) Proc. CHI'09 , pp. 1829-1838
    • Bigham, J.P.1    Cavender, A.C.2
  • 7
    • 80053556855 scopus 로고    scopus 로고
    • Syngress Publishing, Rockland, Massachusetts
    • M. Burnett. Perfect passwords. Syngress Publishing, Rockland, Massachusetts, 2006.
    • (2006) Perfect Passwords
    • Burnett, M.1
  • 9
    • 26844493026 scopus 로고    scopus 로고
    • Authentication of users on mobile telephones: A survey of attitudes and practices
    • N. Clarke and S. Furnell. Authentication of users on mobile telephones: A survey of attitudes and practices. Computers Security, 24(7):519-527, 2005.
    • (2005) Computers Security , vol.24 , Issue.7 , pp. 519-527
    • Clarke, N.1    Furnell, S.2
  • 10
    • 85084161493 scopus 로고    scopus 로고
    • Deja vu: A user study using images for authentication
    • Berkeley, CA, USA, USENIX Association
    • R. Dhamija and A. Perrig. Deja vu: A user study using images for authentication. In Proc. USENIX Security Symposium, pages 45-58, Berkeley, CA, USA, 2000. USENIX Association.
    • (2000) Proc. USENIX Security Symposium , pp. 45-58
    • Dhamija, R.1    Perrig, A.2
  • 11
    • 78650003586 scopus 로고    scopus 로고
    • Timing attacks on pin input devices
    • New York, NY, USA, ACM
    • D. Foo Kune and Y. Kim. Timing attacks on pin input devices. In Proc. CCS'10, pages 678-680, New York, NY, USA, 2010. ACM.
    • (2010) Proc. CCS'10 , pp. 678-680
    • Foo Kune, D.1    Kim, Y.2
  • 12
    • 42149131546 scopus 로고    scopus 로고
    • Developing usable captchas for blind users
    • New York, NY, USA, ACM
    • J. Holman, J. Lazar, J. H. Feng, and J. D'Arcy. Developing usable captchas for blind users. In Proc. ASSETS'07, pages 245-246, New York, NY, USA, 2007. ACM.
    • (2007) Proc. ASSETS'07 , pp. 245-246
    • Holman, J.1    Lazar, J.2    Feng, J.H.3    D'Arcy, J.4
  • 14
    • 84874561028 scopus 로고    scopus 로고
    • Implicit authentication for mobile devices
    • Berkeley, CA, USA, USENIX Association. 115-122, New York, NY, USA, 2009. ACM
    • M. Jakobsson, E. Shi, P. Golle, and R. Chow. Implicit authentication for mobile devices. In Proc. HotSec'09, pages 9-9, Berkeley, CA, USA, 2009. USENIX Association. 115-122, New York, NY, USA, 2009. ACM.
    • (2009) Proc. HotSec'09 , pp. 9-9
    • Jakobsson, M.1    Shi, E.2    Golle, P.3    Chow, R.4
  • 15
    • 57049108759 scopus 로고    scopus 로고
    • Human-in-The-loop: Rethinking security in mobile and pervasive systems
    • New York, NY, USA, ACM
    • V. Kostakos. Human-in-the-loop: rethinking security in mobile and pervasive systems. In CHI EA '08, pages 3075-3080, New York, NY, USA, 2008. ACM.
    • (2008) CHI EA '08 , pp. 3075-3080
    • Kostakos, V.1
  • 16
    • 78650637272 scopus 로고    scopus 로고
    • Toward tactile authentication for blind users
    • New York, NY, USA, ACM
    • R. Kuber and S. Sharma. Toward tactile authentication for blind users. In Proc. ASSETS'10, pages 289-290, New York, NY, USA, 2010. ACM.
    • (2010) Proc. ASSETS'10 , pp. 289-290
    • Kuber, R.1    Sharma, S.2
  • 17
    • 80755144033 scopus 로고    scopus 로고
    • Rhythmlink: Securely pairing i/o-constrained devices by tapping
    • New York, NY, USA, ACM
    • F. X. Lin, D. Ashbrook, and S. White. Rhythmlink: securely pairing i/o-constrained devices by tapping. In Proc. UIST'11, pages 263-272, New York, NY, USA, 2011. ACM.
    • (2011) Proc. UIST'11 , pp. 263-272
    • Lin, F.X.1    Ashbrook, D.2    White, S.3
  • 18
    • 39149106769 scopus 로고    scopus 로고
    • On predictive models and user-drawn graphical passwords
    • Jan.
    • P. C. v. Oorschot and J. Thorpe. On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur., 10(4):5:1-5:33, Jan. 2008.
    • (2008) ACM Trans. Inf. Syst. Secur. , vol.10 , Issue.4 , pp. 51-533
    • Oorschot, P.C.V.1    Thorpe, J.2
  • 20
    • 84870688076 scopus 로고    scopus 로고
    • The secret question is: Why do IT systems use insecure passwords?
    • B. Schneier. The secret question is: why do IT systems use insecure passwords? The Guardian, 2009. http://www.guardian.co.uk/technology/2009/feb/19/ insecurepasswords-conflickerb-worm.
    • (2009) The Guardian
    • Schneier, B.1
  • 21
    • 80955143553 scopus 로고    scopus 로고
    • Accessibility of captcha methods
    • New York, NY, USA, ACM
    • S. Shirali-Shahreza and M. H. Shirali-Shahreza. Accessibility of captcha methods. In Proc. AISec'11, pages 109-110, New York, NY, USA, 2011. ACM.
    • (2011) Proc. AISec'11 , pp. 109-110
    • Shirali-Shahreza, S.1    Shirali-Shahreza, M.H.2
  • 23
    • 19944381937 scopus 로고    scopus 로고
    • Passpoints: Design and longitudinal evaluation of a graphical password system
    • Berkeley, CA, USA, USENIX Association
    • S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon. Passpoints: Design and longitudinal evaluation of a graphical password system. In Proc. USENIX Security Symposium, pages 102-127, Berkeley, CA, USA, 2005. USENIX Association.
    • (2005) Proc. USENIX Security Symposium , pp. 102-127
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.3    Brodskiy, A.4    Memon, N.5
  • 24
    • 70450181317 scopus 로고    scopus 로고
    • Tapsongs: Tapping rhythm-based passwords on a single binary sensor
    • New York, NY, USA, ACM
    • J. O. Wobbrock. Tapsongs: tapping rhythm-based passwords on a single binary sensor. In Proc. UIST'09, pages 93-96, New York, NY, USA, 2009. ACM.
    • (2009) Proc. UIST'09 , pp. 93-96
    • Wobbrock, J.O.1
  • 25
    • 79958126664 scopus 로고    scopus 로고
    • The aligned rank transform for nonparametric factorial analyses using only anova procedures
    • New York, NY, USA, ACM
    • J. O. Wobbrock, L. Findlater, D. Gergle, and J. J. Higgins. The aligned rank transform for nonparametric factorial analyses using only anova procedures. In Proc. CHI'11, pages 143-146, New York, NY, USA, 2011. ACM.
    • (2011) Proc. CHI'11 , pp. 143-146
    • Wobbrock, J.O.1    Findlater, L.2    Gergle, D.3    Higgins, J.J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.