-
1
-
-
84866496149
-
Graphical passwords: Learning from the first twelve years
-
R. Biddle, S. Chiasson, and P. C. van Oorschot, "Graphical passwords: Learning from the first twelve years," ACM Comput. Surveys, vol. 44, no. 4, 2012.
-
(2012)
ACM Comput. Surveys
, vol.44
, Issue.4
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.C.3
-
2
-
-
84883256116
-
-
Feb
-
(2012, Feb.). The Science Behind Passfaces [Online]. Available: http://www.realuser.com/published/ScienceBehindPassfaces.pdf
-
(2012)
The Science behind Passfaces
-
-
-
3
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, "The design and analysis of graphical passwords," in Proc. 8th USENIX Security Symp., 1999, pp. 1-15.
-
(1999)
Proc. 8th USENIX Security Symp.
, pp. 1-15
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
4
-
-
77958098545
-
Pass-Go: A proposal to improve the usability of graphical passwords
-
H. Tao and C. Adams, "Pass-Go: A proposal to improve the usability of graphical passwords," Int. J. Netw. Security, vol. 7, no. 2, pp. 273-292, 2008.
-
(2008)
Int. J. Netw. Security
, vol.7
, Issue.2
, pp. 273-292
-
-
Tao, H.1
Adams, C.2
-
5
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
-
S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," Int. J. HCI, vol. 63, pp. 102-127, Jul. 2005. (Pubitemid 40753495)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
6
-
-
39149106769
-
On predictive models and userdrawn graphical passwords
-
P. C. van Oorschot and J. Thorpe, "On predictive models and userdrawn graphical passwords," ACM Trans. Inf. Syst. Security, vol. 10, no. 4, pp. 1-33, 2008.
-
(2008)
ACM Trans. Inf. Syst. Security
, vol.10
, Issue.4
, pp. 1-33
-
-
Van Oorschot, P.C.1
Thorpe, J.2
-
7
-
-
38049011983
-
Click passwords under investigation
-
K. Golofit, "Click passwords under investigation," in Proc. ESORICS, 2007, pp. 343-358.
-
(2007)
Proc. ESORICS
, pp. 343-358
-
-
Golofit, K.1
-
8
-
-
36848999302
-
Modeling user choice in the PassPoints graphical password scheme
-
DOI 10.1145/1280680.1280684, SOUPS 2007: Proceedings of the Third Symposium On Usable Privacy and Security
-
A. E. Dirik, N. Memon, and J.-C. Birget, "Modeling user choice in the passpoints graphical password scheme," in Proc. Symp. Usable Privacy Security, 2007, pp. 20-28. (Pubitemid 350229376)
-
(2007)
ACM International Conference Proceeding Series
, vol.229
, pp. 20-28
-
-
Dirik, A.E.1
Memon, N.2
Birget, J.-C.3
-
9
-
-
85049042638
-
Human-seeded attacks and exploiting hot spots in graphical passwords
-
J. Thorpe and P. C. van Oorschot, "Human-seeded attacks and exploiting hot spots in graphical passwords," in Proc. USENIX Security, 2007, pp. 103-118.
-
(2007)
Proc. USENIX Security
, pp. 103-118
-
-
Thorpe, J.1
Van Oorschot, P.C.2
-
10
-
-
77955677817
-
Purely automated attacks on passpoints-style graphical passwords
-
Sep.
-
P. C. van Oorschot, A. Salehi-Abari, and J. Thorpe, "Purely automated attacks on passpoints-style graphical passwords," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 393-405, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 393-405
-
-
Van Oorschot, P.C.1
Salehi-Abari, A.2
Thorpe, J.3
-
11
-
-
78751535295
-
Exploiting predictability in clickbased graphical passwords
-
P. C. van Oorschot and J. Thorpe, "Exploiting predictability in clickbased graphical passwords," J. Comput. Security, vol. 19, no. 4, pp. 669-702, 2011.
-
(2011)
J. Comput. Security
, vol.19
, Issue.4
, pp. 669-702
-
-
Van Oorschot, P.C.1
Thorpe, J.2
-
12
-
-
84899816306
-
-
Mar. 26
-
T. Wolverton. (2002, Mar. 26). Hackers Attack eBay Accounts [Online]. Available: http://www.zdnet.co.uk/news/networking/2002/03/26/hackers-attack- ebay-accounts-2107350/
-
(2002)
Hackers Attack EBay Accounts
-
-
Wolverton, T.1
-
13
-
-
84899785985
-
-
HP TippingPoint DVLabs, Vienna, Austria. Top Cyber Security Risks Report, SANS Institute and Qualys Research Labs
-
HP TippingPoint DVLabs, Vienna, Austria. (2010). Top Cyber Security Risks Report, SANS Institute and Qualys Research Labs [Online]. Available: http://dvlabs.tippingpoint.com/toprisks2010
-
(2010)
-
-
-
14
-
-
0038687701
-
Securing passwords against dictionary attacks
-
B. Pinkas and T. Sander, "Securing passwords against dictionary attacks," in Proc. ACM CCS, 2002, pp. 161-170.
-
(2002)
Proc. ACM CCS
, pp. 161-170
-
-
Pinkas, B.1
Sander, T.2
-
15
-
-
33750906057
-
On countering online dictionary attacks with login histories and humans-in-the-loop
-
DOI 10.1145/1178618.1178619
-
P. C. van Oorschot and S. Stubblebine, "On countering online dictionary attacks with login histories and humans-in-the-loop," ACM Trans. Inf. Syst. Security, vol. 9, no. 3, pp. 235-258, 2006. (Pubitemid 44728674)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.3
, pp. 235-258
-
-
Van Oorschot, P.C.1
Stubblebine, S.2
-
16
-
-
81455139721
-
Revisiting defenses against large-scale online password guessing attacks
-
Jan./Feb.
-
M. Alsaleh, M. Mannan, and P. C. van Oorschot, "Revisiting defenses against large-scale online password guessing attacks," IEEE Trans. Dependable Secure Comput., vol. 9, no. 1, pp. 128-141, Jan./Feb. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.1
, pp. 128-141
-
-
Alsaleh, M.1
Mannan, M.2
Van Oorschot, P.C.3
-
17
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, "CAPTCHA: Using hard AI problems for security," in Proc. Eurocrypt, 2003, pp. 294-311.
-
(2003)
Proc. Eurocrypt
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
18
-
-
38049014958
-
Graphical password authentication using cued click points
-
S. Chiasson, P. C. van Oorschot, and R. Biddle, "Graphical password authentication using cued click points," in Proc. ESORICS, 2007, pp. 359-374.
-
(2007)
Proc. ESORICS
, pp. 359-374
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
-
19
-
-
84900557334
-
Influencing users towards better passwords: Persuasive cued click-points
-
S. Chiasson, A. Forget, R. Biddle, and P. C. van Oorschot, "Influencing users towards better passwords: Persuasive cued click-points," in Proc. Brit. HCI Group Annu. Conf. People Comput., Culture, Creativity, Interaction, vol. 1. 2008, pp. 121-130.
-
(2008)
Proc. Brit. HCI Group Annu. Conf. People Comput., Culture, Creativity, Interaction
, vol.1
, pp. 121-130
-
-
Chiasson, S.1
Forget, A.2
Biddle, R.3
Van Oorschot, P.C.4
-
20
-
-
85084162383
-
On user choice in graphical password schemes
-
D. Davis, F. Monrose, and M. Reiter, "On user choice in graphical password schemes," in Proc. USENIX Security, 2004, pp. 1-11.
-
(2004)
Proc. USENIX Security
, pp. 1-11
-
-
Davis, D.1
Monrose, F.2
Reiter, M.3
-
21
-
-
85084161493
-
Déjà Vu: A user study using images for authentication
-
R. Dhamija and A. Perrig, "Déjà Vu: A user study using images for authentication," in Proc. 9th USENIX Security, 2000, pp. 1-4.
-
(2000)
Proc. 9th USENIX Security
, pp. 1-4
-
-
Dhamija, R.1
Perrig, A.2
-
22
-
-
33751057130
-
Cognitive authentication schemes safe against spyware
-
May
-
D. Weinshall, "Cognitive authentication schemes safe against spyware," in Proc. IEEE Symp. Security Privacy, May 2006, pp. 300-306.
-
(2006)
Proc. IEEE Symp. Security Privacy
, pp. 300-306
-
-
Weinshall, D.1
-
23
-
-
69249127514
-
Do background images improve 'Draw a Secret' graphical passwords
-
P. Dunphy and J. Yan, "Do background images improve 'Draw a Secret' graphical passwords," in Proc. ACM CCS, 2007, pp. 1-12.
-
(2007)
Proc. ACM CCS
, pp. 1-12
-
-
Dunphy, P.1
Yan, J.2
-
24
-
-
69749092477
-
Machine learning attacks against the Asirra CAPTCHA
-
P. Golle, "Machine learning attacks against the Asirra CAPTCHA," in Proc. ACM CCS, 2008, pp. 535-542.
-
(2008)
Proc. ACM CCS
, pp. 535-542
-
-
Golle, P.1
-
25
-
-
78650016133
-
Attacks and design of image recognition CAPTCHAs
-
B. B. Zhu et al., "Attacks and design of image recognition CAPTCHAs," in Proc. ACM CCS, 2010, pp. 187-200.
-
(2010)
Proc. ACM CCS
, pp. 187-200
-
-
Zhu, B.B.1
-
26
-
-
66249097513
-
A low-cost attack on a microsoft CAPTCHA
-
J. Yan and A. S. El Ahmad, "A low-cost attack on a microsoft CAPTCHA," in Proc. ACM CCS, 2008, pp. 543-554.
-
(2008)
Proc. ACM CCS
, pp. 543-554
-
-
Yan, J.1
El Ahmad, A.S.2
-
28
-
-
5044232104
-
Distortion estimation techniques in solving visual CAPTCHAs
-
Jul.
-
G. Moy, N. Jones, C. Harkless, and R. Potter, "Distortion estimation techniques in solving visual CAPTCHAs," in Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., Jul. 2004, pp. 23-28.
-
(2004)
Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit
, pp. 23-28
-
-
Moy, G.1
Jones, N.2
Harkless, C.3
Potter, R.4
-
29
-
-
77955214169
-
Computers beat humans at single character recognition in reading-based human interaction proofs
-
K. Chellapilla, K. Larson, P. Simard, and M. Czerwinski, "Computers beat humans at single character recognition in reading-based human interaction proofs," in Proc. 2nd Conf. Email Anti-Spam, 2005, pp. 1-3.
-
(2005)
Proc. 2nd Conf. Email Anti-Spam
, pp. 1-3
-
-
Chellapilla, K.1
Larson, K.2
Simard, P.3
Czerwinski, M.4
-
30
-
-
25144445239
-
Building segmentation based human-friendly human interaction proofs
-
K. Chellapilla, K. Larson, P. Simard, and M. Czerwinski, "Building segmentation based human-friendly human interaction proofs," in Proc. 2nd Int. Workshop Human Interaction Proofs, 2005, pp. 1-10.
-
(2005)
Proc. 2nd Int. Workshop Human Interaction Proofs
, pp. 1-10
-
-
Chellapilla, K.1
Larson, K.2
Simard, P.3
Czerwinski, M.4
-
31
-
-
77952329367
-
Asirra: A CAPTCHA that exploits interest-aligned manual image categorization
-
J. Elson, J. R. Douceur, J. Howell, and J. Saul, "Asirra: A CAPTCHA that exploits interest-aligned manual image categorization," in Proc. ACM CCS, 2007, pp. 366-374.
-
(2007)
Proc. ACM CCS
, pp. 366-374
-
-
Elson, J.1
Douceur, J.R.2
Howell, J.3
Saul, J.4
-
32
-
-
84873285459
-
A new CAPTCHA interface design for mobile devices
-
R. Lin, S.-Y. Huang, G. B. Bell, and Y.-K. Lee, "A new CAPTCHA interface design for mobile devices," in Proc. 12th Austral. User Inter. Conf., 2011, pp. 3-8.
-
(2011)
Proc. 12th Austral. User Inter. Conf.
, pp. 3-8
-
-
Lin, R.1
Huang, S.-Y.2
Bell, G.B.3
Lee, Y.-K.4
-
33
-
-
84899846356
-
-
Nov. 29
-
N. Joshi. (2009, Nov. 29). Koobface Worm Asks for CAPTCHA [Online]. Available: http://blogs.mcafee.com/mcafee-labs/koobface-worm-asksfor-CAPTCHA
-
(2009)
Koobface Worm Asks for CAPTCHA
-
-
Joshi, N.1
-
34
-
-
85076285223
-
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context
-
M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage, "Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context," in Proc. USENIX Security, 2010, pp. 435-452.
-
(2010)
Proc. USENIX Security
, pp. 435-452
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
35
-
-
48649085499
-
Secure input for web applications
-
M. Szydlowski, C. Kruegel, and E. Kirda, "Secure input for web applications," in Proc. ACSAC, 2007, pp. 375-384.
-
(2007)
Proc. ACSAC
, pp. 375-384
-
-
Szydlowski, M.1
Kruegel, C.2
Kirda, E.3
-
36
-
-
77954652031
-
2-pass mesh warping
-
Hoboken, NJ, USA: Wiley
-
G. Wolberg, "2-pass mesh warping," in Digital Image Warping. Hoboken, NJ, USA: Wiley, 1990.
-
(1990)
Digital Image Warping
-
-
Wolberg, G.1
-
37
-
-
84899839370
-
-
HP TippingPoint DVLabs, New York, NY, USA.
-
HP TippingPoint DVLabs, New York, NY, USA. (2011). The Mid-Year Top Cyber Security Risks Report [Online]. Available: http://h20195.www2.hp.com/v2/GetPDF. aspx/4AA3-7045ENW.pdf
-
(2011)
The Mid-Year Top Cyber Security Risks Report
-
-
-
38
-
-
84862114367
-
Enabling concurrent dual views on common LCD screens
-
S. Kim, X. Cao, H. Zhang, and D. Tan, "Enabling concurrent dual views on common LCD screens," in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 2175-2184.
-
(2012)
Proc. ACM Annu. Conf. Human Factors Comput. Syst.
, pp. 2175-2184
-
-
Kim, S.1
Cao, X.2
Zhang, H.3
Tan, D.4
-
39
-
-
84979286171
-
Breaking e-banking CAPTCHAs
-
S. Li, S. A. H. Shah, M. A. U. Khan, S. A. Khayam, A.-R. Sadeghi, and R. Schmitz, "Breaking e-banking CAPTCHAs," in Proc. ACSAC, 2010, pp. 1-10.
-
(2010)
Proc. ACSAC
, pp. 1-10
-
-
Li, S.1
Shah, S.A.H.2
Khan, M.A.U.3
Khayam, S.A.4
Sadeghi, A.-R.5
Schmitz, R.6
-
40
-
-
84871480617
-
A new graphical password scheme against spyware by using CAPTCHA
-
H. Gao, X. Liu, S.Wang, and R. Dai, "A new graphical password scheme against spyware by using CAPTCHA," in Proc. Symp. Usable Privacy Security, 2009, pp. 760-767.
-
(2009)
Proc. Symp. Usable Privacy Security
, pp. 760-767
-
-
Gao, H.1
Liu, X.2
Wang, S.3
Dai, R.4
-
41
-
-
77954337293
-
Against spyware using CAPTCHA in graphical password scheme
-
Jun.
-
L. Wang, X. Chang, Z. Ren, H. Gao, X. Liu, and U. Aickelin, "Against spyware using CAPTCHA in graphical password scheme," in Proc. IEEE Int. Conf. Adv. Inf. Netw. Appl., Jun. 2010, pp. 1-9.
-
(2010)
Proc. IEEE Int. Conf. Adv. Inf. Netw. Appl
, pp. 1-9
-
-
Wang, L.1
Chang, X.2
Ren, Z.3
Gao, H.4
Liu, X.5
Aickelin, U.6
-
42
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
Jun.
-
J. Bonneau, "The science of guessing: Analyzing an anonymized corpus of 70 million passwords," in Proc. IEEE Symp. Security Privacy, Jun. 2012, pp. 20-25.
-
(2012)
Proc. IEEE Symp. Security Privacy
, pp. 20-25
-
-
Bonneau, J.1
-
43
-
-
84899844196
-
-
John the Ripper Password Cracker
-
John the Ripper Password Cracker [Online]. Available: http://www. openwall.com/john/
-
-
-
-
44
-
-
84899819504
-
-
Openwall Wordlists Collection
-
Openwall Wordlists Collection [Online]. Available: http://www. openwall.com/wordlists/
-
-
-
|