-
1
-
-
84876806083
-
Biometric authentication revisited: Understanding the impact of wolves in sheep’s clothing
-
L. Ballard, F. Monrose, and D. Lopresti. Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep’s Clothing. In 15th Annual USENIX Security Symposium, pages 29–41, 2006.
-
(2006)
15th Annual USENIX Security Symposium
, pp. 29-41
-
-
Ballard, L.1
Monrose, F.2
Lopresti, D.3
-
2
-
-
0242697248
-
High dictionary compression for proactive password checking
-
F. Bergadano, B. Crispo, and G. Ruffo. High Dictionary Compression for Proactive Password Checking. ACM Trans. Inf. Syst. Secur., 1(1):3–25, 1998.
-
(1998)
ACM Trans. Inf. Syst. Secur.
, vol.1
, Issue.1
, pp. 3-25
-
-
Bergadano, F.1
Crispo, B.2
Ruffo, G.3
-
3
-
-
33748107711
-
Robust discretization, with an application to graphical passwords
-
J.C. Birget, D. Hong, and N. Memon. Robust Discretization, with an Application to Graphical Passwords. IEEE Transactions on Information Forensics and Security, 1:395–399, 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, pp. 395-399
-
-
Birget, J.C.1
Hong, D.2
Memon, N.3
-
5
-
-
85077721953
-
-
Ian Britton. http://www.freefoto.com, accessed Feb. 2, 2007
-
Ian Britton. http://www.freefoto.com, accessed Feb. 2, 2007.
-
-
-
-
9
-
-
0003435471
-
-
Brooks/Cole Publishing, Pacific Grove, CA, USA, 4th edition
-
J.L. Devore. Probability and Statistics for Engineering and the Sciences. Brooks/Cole Publishing, Pacific Grove, CA, USA, 4th edition, 1995.
-
(1995)
Probability and Statistics for Engineering and the Sciences
-
-
Devore, J.L.1
-
11
-
-
9644254228
-
Efficient graph-based image segmentation
-
Code
-
P.F. Felzenszwalb and D.P. Huttenlocher. Efficient Graph-Based Image Segmentation. Int. J. Computer Vision, 59(2), 2004. Code available from: http://people.cs.uchicago.edu/~pff/segment/.
-
(2004)
Int. J. Computer Vision
, vol.59
, Issue.2
-
-
Felzenszwalb, P.F.1
Huttenlocher, D.P.2
-
12
-
-
85077712163
-
-
FreeImages.com. http://www.freeimages. com, accessed Feb. 2, 2007
-
FreeImages.com. http://www.freeimages. com, accessed Feb. 2, 2007.
-
-
-
-
17
-
-
0032204063
-
A model of saliency-based visual attention for rapid scene analysis
-
L. Itti, C. Koch, and E. Niebur. A Model of Saliency-Based Visual Attention for Rapid Scene Analysis. IEEE Trans. on Pattern Analysis and Machine Intelligence, 20(11):1254–1259, 1998.
-
(1998)
IEEE Trans. On Pattern Analysis and Machine Intelligence
, vol.20
, Issue.11
, pp. 1254-1259
-
-
Itti, L.1
Koch, C.2
Niebur, E.3
-
18
-
-
26844503950
-
Picture password: A visual login technique for mobile devices
-
W. Jansen, S. Gavrilla, V. Korolev, R. Ayers, and Swanstrom R. Picture Password: A Visual Login Technique for Mobile Devices. NIST Report: NIS-TIR 7030, 2003.
-
(2003)
NIST Report: NIS-TIR 7030
-
-
Jansen, W.1
Gavrilla, S.2
Korolev, V.3
Ayers, R.4
Swanstrom, R.5
-
19
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The Design and Analysis of Graphical Passwords. In 8th USENIX Security Symposium, 1999.
-
(1999)
8th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
20
-
-
33846318568
-
Have the cake and eat it too - infusing usability into text-password based authentication systems
-
S. Jeyaraman and U. Topkara. Have the Cake and Eat it too - Infusing Usability into Text-Password Based Authentication Systems. In 21st ACSAC, pages 473–482, 2005.
-
(2005)
21st ACSAC
, pp. 473-482
-
-
Jeyaraman, S.1
Topkara, U.2
-
21
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
D. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. In The 2nd USENIX Security Workshop, pages 5–14, 1990.
-
(1990)
The 2nd USENIX Security Workshop
, pp. 5-14
-
-
Klein, D.1
-
23
-
-
34250767745
-
Human selection of mnemonic phrase-based passwords
-
New York, NY, ACM Press
-
C. Kuo, S. Romanosky, and L.F. Cranor. Human Selection of Mnemonic Phrase-based Passwords. In 2nd Symp. Usable Privacy and Security (SOUPS), pages 67–78, New York, NY, 2006. ACM Press.
-
(2006)
2nd Symp. Usable Privacy and Security (SOUPS)
, pp. 67-78
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
24
-
-
26444619774
-
The effectiveness of generative attacks on an online handwriting biometric
-
Daniel P. Lopresti and Jarret D. Raim. The Effectiveness of Generative Attacks on an Online Handwriting Biometric. In AVBPA, pages 1090–1099, 2005.
-
(2005)
AVBPA
, pp. 1090-1099
-
-
Lopresti, D.P.1
Raim, J.D.2
-
25
-
-
0002987413
-
Picture memory
-
John C. Yuille, editor, Lawrence Erlbaum Associates, N.J., U.S.A
-
S. Madigan. Picture Memory. In John C. Yuille, editor, Imagery, Memory and Cognition, pages 65–89. Lawrence Erlbaum Associates, N.J., U.S.A., 1983.
-
(1983)
Imagery, Memory and Cognition
, pp. 65-89
-
-
Madigan, S.1
-
27
-
-
39149113346
-
Graphical passwords
-
L. Cranor and S. Garfinkel, editors, ch. O’Reilly
-
F. Monrose and M. K. Reiter. Graphical Passwords. In L. Cranor and S. Garfinkel, editors, Security and Usability, ch. 9, pages 147–164. O’Reilly, 2005.
-
(2005)
Security and Usability
, vol.9
, pp. 147-164
-
-
Monrose, F.1
Reiter, M.K.2
-
28
-
-
21644466970
-
-
accessed Nov. 9, 2006
-
A. Muffett. Crack password cracker, 2006. http://www.crypticide.com/users/alecm/security/c50-faq.html, accessed Nov. 9, 2006.
-
(2006)
Crack Password Cracker
-
-
Muffett, A.1
-
30
-
-
84872105856
-
-
accessed Nov. 9, 2006
-
Openwall Project. John the Ripper password cracker, 2006. http://www.openwall.com/john/, accessed Nov. 9, 2006.
-
(2006)
John the Ripper Password Cracker
-
-
-
31
-
-
85077721679
-
-
Passlogix. http://www.passlogix.com, accessed Feb. 2, 2007
-
Passlogix. http://www.passlogix.com, accessed Feb. 2, 2007.
-
-
-
-
33
-
-
0029315746
-
A redrawn vandenberg and kuse mental rotations test: Different versions and factors that affect performance
-
M. Peters, B. Laeng, K. Latham, M. Jackson, R. Zaiyouna, and C. Richardson. A Redrawn Vandenberg and Kuse Mental Rotations Test: Different Versions and Factors That Affect Performance. Brain and Cognition, 28:39–58, 1995.
-
(1995)
Brain and Cognition
, vol.28
, pp. 39-58
-
-
Peters, M.1
Laeng, B.2
Latham, K.3
Jackson, M.4
Zaiyouna, R.5
Richardson, C.6
-
35
-
-
85077725132
-
-
accessed Nov. 9, 2006
-
Real User Corporation. About Passfaces, 2006. http://www.realuser.com/about/aboutpassfaces.htm, accessed Nov. 9, 2006.
-
(2006)
About Passfaces
-
-
-
36
-
-
39349101677
-
What users know and what they actually do
-
February accessed March 10, 2007
-
Shannon Riley. What Users Know and What They Actually Do. Usability News, 8(1), February 2006. http://psychology.wichita.edu/surl/usabilitynews/81/Passwords. htm, accessed March 10, 2007.
-
(2006)
Usability News
, vol.8
, Issue.1
-
-
Riley, S.1
-
38
-
-
0026869371
-
Opus: Preventing weak password choices
-
E.H. Spafford. OPUS: Preventing Weak Password Choices. Comput. Secur., 11(3):273–278, 1992.
-
(1992)
Comput. Secur.
, vol.11
, Issue.3
, pp. 273-278
-
-
Spafford, E.H.1
-
44
-
-
33751057130
-
Cognitive authentication schemes safe against spyware (short paper)
-
D. Weinshall. Cognitive Authentication Schemes Safe Against Spyware (short paper). In IEEE Symp. on Security and Privacy, pages 295–300, 2006.
-
(2006)
IEEE Symp. On Security and Privacy
, pp. 295-300
-
-
Weinshall, D.1
-
45
-
-
33748943409
-
Authentication using graphical passwords: Basic results
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Basic results. In Human-Computer Interaction International (HCII 2005), 2005.
-
(2005)
Human-Computer Interaction International (HCII 2005)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
46
-
-
33748943409
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, and N. Memon. Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. In Symp. Usable Priv. & Security (SOUPS), 2005.
-
(2005)
Symp. Usable Priv. & Security (SOUPS)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
47
-
-
19944381937
-
Passpoints: Design and longitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, and N. Memon. PassPoints: Design and Longitudinal Evaluation of a Graphical Password System. International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), 63:102–127, 2005.
-
(2005)
International J. Of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security)
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
48
-
-
12844275960
-
Password memorability and security: Empirical results
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password Memorability and Security: Empirical Results. IEEE Security and Privacy, 2(5):25–31, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|