메뉴 건너뛰기




Volumn , Issue , 2007, Pages 103-118

Human-seeded attacks and exploiting hot-spots in graphical passwords

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; BEHAVIORAL RESEARCH;

EID: 85049042638     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (135)

References (48)
  • 1
    • 84876806083 scopus 로고    scopus 로고
    • Biometric authentication revisited: Understanding the impact of wolves in sheep’s clothing
    • L. Ballard, F. Monrose, and D. Lopresti. Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep’s Clothing. In 15th Annual USENIX Security Symposium, pages 29–41, 2006.
    • (2006) 15th Annual USENIX Security Symposium , pp. 29-41
    • Ballard, L.1    Monrose, F.2    Lopresti, D.3
  • 2
    • 0242697248 scopus 로고    scopus 로고
    • High dictionary compression for proactive password checking
    • F. Bergadano, B. Crispo, and G. Ruffo. High Dictionary Compression for Proactive Password Checking. ACM Trans. Inf. Syst. Secur., 1(1):3–25, 1998.
    • (1998) ACM Trans. Inf. Syst. Secur. , vol.1 , Issue.1 , pp. 3-25
    • Bergadano, F.1    Crispo, B.2    Ruffo, G.3
  • 5
    • 85077721953 scopus 로고    scopus 로고
    • Ian Britton. http://www.freefoto.com, accessed Feb. 2, 2007
    • Ian Britton. http://www.freefoto.com, accessed Feb. 2, 2007.
  • 11
    • 9644254228 scopus 로고    scopus 로고
    • Efficient graph-based image segmentation
    • Code
    • P.F. Felzenszwalb and D.P. Huttenlocher. Efficient Graph-Based Image Segmentation. Int. J. Computer Vision, 59(2), 2004. Code available from: http://people.cs.uchicago.edu/~pff/segment/.
    • (2004) Int. J. Computer Vision , vol.59 , Issue.2
    • Felzenszwalb, P.F.1    Huttenlocher, D.P.2
  • 12
    • 85077712163 scopus 로고    scopus 로고
    • FreeImages.com. http://www.freeimages. com, accessed Feb. 2, 2007
    • FreeImages.com. http://www.freeimages. com, accessed Feb. 2, 2007.
  • 20
    • 33846318568 scopus 로고    scopus 로고
    • Have the cake and eat it too - infusing usability into text-password based authentication systems
    • S. Jeyaraman and U. Topkara. Have the Cake and Eat it too - Infusing Usability into Text-Password Based Authentication Systems. In 21st ACSAC, pages 473–482, 2005.
    • (2005) 21st ACSAC , pp. 473-482
    • Jeyaraman, S.1    Topkara, U.2
  • 21
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • D. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. In The 2nd USENIX Security Workshop, pages 5–14, 1990.
    • (1990) The 2nd USENIX Security Workshop , pp. 5-14
    • Klein, D.1
  • 24
    • 26444619774 scopus 로고    scopus 로고
    • The effectiveness of generative attacks on an online handwriting biometric
    • Daniel P. Lopresti and Jarret D. Raim. The Effectiveness of Generative Attacks on an Online Handwriting Biometric. In AVBPA, pages 1090–1099, 2005.
    • (2005) AVBPA , pp. 1090-1099
    • Lopresti, D.P.1    Raim, J.D.2
  • 25
    • 0002987413 scopus 로고
    • Picture memory
    • John C. Yuille, editor, Lawrence Erlbaum Associates, N.J., U.S.A
    • S. Madigan. Picture Memory. In John C. Yuille, editor, Imagery, Memory and Cognition, pages 65–89. Lawrence Erlbaum Associates, N.J., U.S.A., 1983.
    • (1983) Imagery, Memory and Cognition , pp. 65-89
    • Madigan, S.1
  • 27
    • 39149113346 scopus 로고    scopus 로고
    • Graphical passwords
    • L. Cranor and S. Garfinkel, editors, ch. O’Reilly
    • F. Monrose and M. K. Reiter. Graphical Passwords. In L. Cranor and S. Garfinkel, editors, Security and Usability, ch. 9, pages 147–164. O’Reilly, 2005.
    • (2005) Security and Usability , vol.9 , pp. 147-164
    • Monrose, F.1    Reiter, M.K.2
  • 28
    • 21644466970 scopus 로고    scopus 로고
    • accessed Nov. 9, 2006
    • A. Muffett. Crack password cracker, 2006. http://www.crypticide.com/users/alecm/security/c50-faq.html, accessed Nov. 9, 2006.
    • (2006) Crack Password Cracker
    • Muffett, A.1
  • 30
    • 84872105856 scopus 로고    scopus 로고
    • accessed Nov. 9, 2006
    • Openwall Project. John the Ripper password cracker, 2006. http://www.openwall.com/john/, accessed Nov. 9, 2006.
    • (2006) John the Ripper Password Cracker
  • 31
    • 85077721679 scopus 로고    scopus 로고
    • Passlogix. http://www.passlogix.com, accessed Feb. 2, 2007
    • Passlogix. http://www.passlogix.com, accessed Feb. 2, 2007.
  • 33
    • 0029315746 scopus 로고
    • A redrawn vandenberg and kuse mental rotations test: Different versions and factors that affect performance
    • M. Peters, B. Laeng, K. Latham, M. Jackson, R. Zaiyouna, and C. Richardson. A Redrawn Vandenberg and Kuse Mental Rotations Test: Different Versions and Factors That Affect Performance. Brain and Cognition, 28:39–58, 1995.
    • (1995) Brain and Cognition , vol.28 , pp. 39-58
    • Peters, M.1    Laeng, B.2    Latham, K.3    Jackson, M.4    Zaiyouna, R.5    Richardson, C.6
  • 35
    • 85077725132 scopus 로고    scopus 로고
    • accessed Nov. 9, 2006
    • Real User Corporation. About Passfaces, 2006. http://www.realuser.com/about/aboutpassfaces.htm, accessed Nov. 9, 2006.
    • (2006) About Passfaces
  • 36
    • 39349101677 scopus 로고    scopus 로고
    • What users know and what they actually do
    • February accessed March 10, 2007
    • Shannon Riley. What Users Know and What They Actually Do. Usability News, 8(1), February 2006. http://psychology.wichita.edu/surl/usabilitynews/81/Passwords. htm, accessed March 10, 2007.
    • (2006) Usability News , vol.8 , Issue.1
    • Riley, S.1
  • 38
    • 0026869371 scopus 로고
    • Opus: Preventing weak password choices
    • E.H. Spafford. OPUS: Preventing Weak Password Choices. Comput. Secur., 11(3):273–278, 1992.
    • (1992) Comput. Secur. , vol.11 , Issue.3 , pp. 273-278
    • Spafford, E.H.1
  • 41
  • 44
    • 33751057130 scopus 로고    scopus 로고
    • Cognitive authentication schemes safe against spyware (short paper)
    • D. Weinshall. Cognitive Authentication Schemes Safe Against Spyware (short paper). In IEEE Symp. on Security and Privacy, pages 295–300, 2006.
    • (2006) IEEE Symp. On Security and Privacy , pp. 295-300
    • Weinshall, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.