-
1
-
-
85037151582
-
Cryptanalysis of the convex hull click human identification protocol
-
H. J. Asghar, S. Li, J. Pieprzyk, and H. Wang. Cryptanalysis of the convex hull click human identification protocol. In Proceedings of the 13th international conference on Information security, pages 24-30, 2010.
-
(2010)
Proceedings of the 13th international conference on Information security
, pp. 24-30
-
-
Asghar, H. J.1
Li, S.2
Pieprzyk, J.3
Wang, H.4
-
4
-
-
60649085571
-
Pas: Predicate-based authentication services against powerful passive adversaries
-
X. Bai, W. Gu, S. Chellappan, X. Wang, D. Xuan, and B. Ma. Pas: Predicate-based authentication services against powerful passive adversaries. In Proceedings of the 2008 Annual Computer Security Applications Conference, pages 433-442, 2008.
-
(2008)
Proceedings of the 2008 Annual Computer Security Applications Conference
, pp. 433-442
-
-
Bai, X.1
Gu, W.2
Chellappan, S.3
Wang, X.4
Xuan, D.5
Ma, B.6
-
7
-
-
48749127077
-
Effect of a simple experimental control: The recall constraint in sternberg's memory scanning task
-
L. Corbina and J. Marquer. Effect of a simple experimental control: The recall constraint in sternberg's memory scanning task. European Journal of Cognitive Psychology, 20(5):913-935, 2008.
-
(2008)
European Journal of Cognitive Psychology
, vol.20
, Issue.5
, pp. 913-935
-
-
Corbina, L.1
Marquer, J.2
-
9
-
-
84981263306
-
The magical number 4 in short-term memory: a reconsideration of mental storage capacity
-
N. Cowan. The magical number 4 in short-term memory: a reconsideration of mental storage capacity. Behavioral and Brain Sciences, 24(1):87-114, 2001.
-
(2001)
Behavioral and Brain Sciences
, vol.24
, Issue.1
, pp. 87-114
-
-
Cowan, N.1
-
10
-
-
33947706314
-
Age differences in recall and recognition
-
F. I. Craik and J. M. McDowd. Age differences in recall and recognition. Journal of Experimental Psychology: Learning, Memory, and Cognition, 13(3):474-479, 1987.
-
(1987)
Journal of Experimental Psychology: Learning, Memory, and Cognition
, vol.13
, Issue.3
, pp. 474-479
-
-
Craik, F. I.1
McDowd, J. M.2
-
12
-
-
0021508997
-
Central capacity limits in consistent mapping, visual search tasks: Four channels or more?
-
D. L. Fisher. Central capacity limits in consistent mapping, visual search tasks: Four channels or more? Cognitive Psychology, 16(4):449-484, 1984.
-
(1984)
Cognitive Psychology
, vol.16
, Issue.4
, pp. 449-484
-
-
Fisher, D. L.1
-
14
-
-
0000175409
-
Differential effects of study and test trials on long-term recognition and recall
-
R. M. Hogan and W. Kintsch. Differential effects of study and test trials on long-term recognition and recall. Journal of Verbal Learning and Verbal Behavior, 10(5):562-567, 1971.
-
(1971)
Journal of Verbal Learning and Verbal Behavior
, vol.10
, Issue.5
, pp. 562-567
-
-
Hogan, R. M.1
Kintsch, W.2
-
16
-
-
0035258398
-
Search for multiple targets: Remember the targets, forget the search
-
T. S. Horowitz and J. M. Wolfe. Search for multiple targets: Remember the targets, forget the search. Perception & Psychophysics, 63(2):272-285, 2001.
-
(2001)
Perception & Psychophysics
, vol.63
, Issue.2
, pp. 272-285
-
-
Horowitz, T. S.1
Wolfe, J. M.2
-
17
-
-
51249089651
-
A virtual password scheme to protect passwords
-
M. Lei, Y. Xiao, S. Vrbsky, C.-C. Li, and L. Liu. A virtual password scheme to protect passwords. In Proceedings of IEEE International Conference on Communications, pages 1536-1540, 2008.
-
(2008)
Proceedings of IEEE International Conference on Communications
, pp. 1536-1540
-
-
Lei, M.1
Xiao, Y.2
Vrbsky, S.3
Li, C.-C.4
Liu, L.5
-
18
-
-
77950838084
-
On the security of pas (predicate-based authentication service)
-
S. Li, H. Asghar, J. Pieprzyk, A.-R. Sadeghi, R. Schmitz, and H. Wang. On the security of pas (predicate-based authentication service). In Proceedings of the 2009 Annual Computer Security Applications Conference, pages 209-218, 2009.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference
, pp. 209-218
-
-
Li, S.1
Asghar, H.2
Pieprzyk, J.3
Sadeghi, A.-R.4
Schmitz, R.5
Wang, H.6
-
19
-
-
77955388623
-
Breaking randomized linear generation functions based virtual password system
-
S. Li, S. A. Khayam, A.-R. Sadeghi, and R. Schmitz. Breaking randomized linear generation functions based virtual password system. In Proceedings of the 2010 IEEE International Conference on Communications, pages 23-27, 2010.
-
(2010)
Proceedings of the 2010 IEEE International Conference on Communications
, pp. 23-27
-
-
Li, S.1
Khayam, S. A.2
Sadeghi, A.-R.3
Schmitz, R.4
-
20
-
-
33751034055
-
Secure human-computer identification (interface) systems against peeping attacks: SecHCI
-
Report 2005/268
-
S. Li and H. yeung Shum. Secure human-computer identification (interface) systems against peeping attacks: SecHCI. In Cryptology ePrint Archive, Report 2005/268, 2005.
-
(2005)
Cryptology ePrint Archive
-
-
Li, S.1
yeung Shum, H.2
-
23
-
-
0035287623
-
Retrieval processes in recognition and cued recall
-
P. A. Nobel and R. M. Shiffrin. Retrieval processes in recognition and cued recall. Journal of Experimental Psychology: Learning, Memory, and Cognition, 27(2):384-413, 2001.
-
(2001)
Journal of Experimental Psychology: Learning, Memory, and Cognition
, vol.27
, Issue.2
, pp. 384-413
-
-
Nobel, P. A.1
Shiffrin, R. M.2
-
24
-
-
84862945377
-
Breaking undercover: Exploiting design flaws and nonuniform human behavior
-
T. Perkovic, A. Mumtaz, Y. Javed, S. Li, S. A. Khayam, and M. Cagalj. Breaking undercover: Exploiting design flaws and nonuniform human behavior. In Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011.
-
(2011)
Proceedings of the Seventh Symposium on Usable Privacy and Security
-
-
Perkovic, T.1
Mumtaz, A.2
Javed, Y.3
Li, S.4
Khayam, S. A.5
Cagalj, M.6
-
25
-
-
0027954001
-
An analysis of latency and interresponse time in free recall
-
D. Rohrer and J. Wixted. An analysis of latency and interresponse time in free recall. Memory. & Cognition, 22(5):511-524, 1994.
-
(1994)
Memory. & Cognition
, vol.22
, Issue.5
, pp. 511-524
-
-
Rohrer, D.1
Wixted, J.2
-
28
-
-
0014623947
-
Memory-scanning: Mental processes revealed by reaction-time experiments
-
S. Sternberg. Memory-scanning: Mental processes revealed by reaction-time experiments. American Scientist, 57:421-457, 1969.
-
(1969)
American Scientist
, vol.57
, pp. 421-457
-
-
Sternberg, S.1
-
29
-
-
33846313973
-
The nature of individual differences in working memory capacity: Active maintenance in primary memory and controlled search from secondary memory
-
N. Unsworth and R. W. Engle. The nature of individual differences in working memory capacity: Active maintenance in primary memory and controlled search from secondary memory. Psychological Review, 114(1):104-132, 2007.
-
(2007)
Psychological Review
, vol.114
, Issue.1
, pp. 104-132
-
-
Unsworth, N.1
Engle, R. W.2
-
30
-
-
1942455789
-
Neural activity predicts individual differences in visual working memory capacity
-
E. Vogel and M. Machizawa. Neural activity predicts individual differences in visual working memory capacity. Nature, 428(6984):748-751, 2004.
-
(2004)
Nature
, vol.428
, Issue.6984
, pp. 748-751
-
-
Vogel, E.1
Machizawa, M.2
-
32
-
-
34247167942
-
Design and evaluation of a shoulder-surfing resistant graphical password scheme
-
S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proceedings of the working conference on Advanced visual interfaces, pages 177-184, 2006.
-
(2006)
Proceedings of the working conference on Advanced visual interfaces
, pp. 177-184
-
-
Wiedenbeck, S.1
Waters, J.2
Sobrado, L.3
Birget, J.-C.4
-
33
-
-
33745843724
-
The role of working memory and long-term memory in visual search
-
G. F. Woodman and M. M. Chun. The role of working memory and long-term memory in visual search. Visual Cognition, 14(4-8):808-830, 2006.
-
(2006)
Visual Cognition
, vol.14
, Issue.4-8
, pp. 808-830
-
-
Woodman, G. F.1
Chun, M. M.2
-
34
-
-
4344573868
-
Visual search is slowed when visuospatial working memory is occupied
-
G. F. Woodman and S. J. Luck. Visual search is slowed when visuospatial working memory is occupied. Psychonomic Bulletin and Review, 11(2):269-274, 2004.
-
(2004)
Psychonomic Bulletin and Review
, vol.11
, Issue.2
, pp. 269-274
-
-
Woodman, G. F.1
Luck, S. J.2
|