-
1
-
-
0043232732
-
Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures
-
Adams, A., Sasse, M.A., 1999. Users are not the enemy: why users compromise security mechanisms and how to take remedial measures. Communications of the ACM 42 (12), 40-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
0000107098
-
Improved voice identification using a nearest neighbour distance measure
-
Adelaide
-
Bahler, L., Porter, J., Higgins, A., 1994. Improved voice identification using a nearest neighbour distance measure Proceedings of ICASSP'94 1994 pp. 321-324, Adelaide.
-
(1994)
Proceedings of ICASSP'94 1994
, pp. 321-324
-
-
Bahler, L.1
Porter, J.2
Higgins, A.3
-
4
-
-
78650165017
-
User authentication through keystroke dynamics
-
Bergadano, F., Gunetti, D., Picardi, C., 2002. User authentication through keystroke dynamics. ACM Transactions on Information and System Security (TISSEC) 5 (4), 367-397.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
6
-
-
9944250708
-
-
Graphical Password United States Patent 5559961 1996
-
Blonder, G.E., 1996. Graphical Password United States Patent 5559961 1996.
-
(1996)
-
-
Blonder, G.E.1
-
7
-
-
0003429117
-
Are passfaces more usable than passwords? A field trial investigation
-
McDonald, S. (Ed.). Springer, Berlin
-
Brostoff, S., Sasse, A., 2000. Are passfaces more usable than passwords? A field trial investigation, in: McDonald, S. (Ed.), People and Computers XIV - Usability or Else! Proceedings of HCI 2000. Springer, Berlin, pp. 405-424.
-
(2000)
People and Computers XIV - Usability or Else! Proceedings of HCI 2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, A.2
-
8
-
-
0002817168
-
Using ear biometrics for passive identification
-
Papp, G., Posch, R. (Eds.), Wien
-
Burge, M., Burger, W., 1998. Using ear biometrics for passive identification, in: Papp, G., Posch, R. (Eds.), Proceedings of the IFIP TC11 14th International Conference on Information Security, SEC'98, Wien, pp. 139-148.
-
(1998)
Proceedings of the IFIP TC11 14th International Conference on Information Security, SEC'98
, pp. 139-148
-
-
Burge, M.1
Burger, W.2
-
9
-
-
9944227545
-
Biometric verification at a self-service interface
-
McCabe, P.T. (Ed.). Taylor and Francis, London
-
Coventry, L., De Angeli, A., Johnson, G.I., 2003a. Biometric verification at a self-service interface, in: McCabe, P.T. (Ed.), Contemporary Ergonomics. Taylor and Francis, London, pp. 247-252.
-
(2003)
Contemporary Ergonomics
, pp. 247-252
-
-
Coventry, L.1
De Angeli, A.2
Johnson, G.I.3
-
10
-
-
51049087510
-
-
ACM Press, New York
-
Coventry, L., De Angeli, A., Johnson, G.I., 2003b. Usability and Biometric Verification at the ATM Interface CHI 2003 Proceedings. ACM Press, New York.
-
(2003)
Usability and Biometric Verification at the ATM Interface CHI 2003 Proceedings
-
-
Coventry, L.1
De Angeli, A.2
Johnson, G.I.3
-
12
-
-
0037668484
-
VIP: A visual approach to user authentication
-
2002. ACM Press, New York
-
De Angeli, A., Coutts, M., Coventry, L., Johnson, G.I., 2002. VIP: a visual approach to user authentication Proceedings of the Working Conference on Advanced Visual Interfaces AVI. 2002. ACM Press, New York, pp. 316-323.
-
(2002)
Proceedings of the Working Conference on Advanced Visual Interfaces AVI
, pp. 316-323
-
-
De Angeli, A.1
Coutts, M.2
Coventry, L.3
Johnson, G.I.4
-
13
-
-
9944261689
-
Usability and user authentication: Pictorial passwords vs. pin
-
McCabe, P.T. (Ed.). Taylor and Francis, London
-
De Angeli A., Coventry, L., Johnson, G.I., Coutts, M., 2003. Usability and user authentication: pictorial passwords vs. pin, in: McCabe, P.T. (Ed.), Contemporary Ergonomics 2003. Taylor and Francis, London, pp. 253-258.
-
(2003)
Contemporary Ergonomics 2003
, pp. 253-258
-
-
De Angeli, A.1
Coventry, L.2
Johnson, G.I.3
Coutts, M.4
-
14
-
-
27544436981
-
Reinforcing password authentication with typing biometrics
-
IFIP/SEC'95. Chapman and Hall, London, UK
-
de Ru, W.G., Eloff, J.H.P., 1995. Reinforcing password authentication with typing biometrics. In Proceedings of the IFIP TC11 eleventh international conference on information security, IFIP/SEC'95. Chapman and Hall, London, UK.
-
(1995)
Proceedings of the IFIP TC11 Eleventh International Conference on Information Security
-
-
De Ru, W.G.1
Eloff, J.H.P.2
-
19
-
-
0003973574
-
-
Taylor and Francis, New York
-
Goodstein, L.P., Andersen, H.B., Olsen, S.E., 1988. Tasks, Errors and Mental Models. Taylor and Francis, New York.
-
(1988)
Tasks, Errors and Mental Models
-
-
Goodstein, L.P.1
Andersen, H.B.2
Olsen, S.E.3
-
21
-
-
21944437577
-
Proposal of user identification scheme using mouse
-
Han, Y., Okamoto, T., Qing, S. (Eds.)
-
Hayashi, K., Okamoto, E., Mambo, M., 1997. Proposal of user identification scheme using mouse, in: Han, Y., Okamoto, T., Qing, S. (Eds.), Proceedings of the 1st International Information and Communications Security Conference Lecture Notes in Computer Science, pp. 144-148.
-
(1997)
Proceedings of the 1st International Information and Communications Security Conference Lecture Notes in Computer Science
, pp. 144-148
-
-
Hayashi, K.1
Okamoto, E.2
Mambo, M.3
-
24
-
-
9944249889
-
-
August 2000
-
Jermyn, I., Mayer, A., Monrose, F., Reoter, M.K., Rubin, A.D., 2000. The Design and Analysis of Graphical Passwords Proceedings of the 9th USENIX Security Symposium, August 2000.
-
(2000)
The Design and Analysis of Graphical Passwords Proceedings of the 9th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reoter, M.K.4
Rubin, A.D.5
-
25
-
-
84982070834
-
What is the Sapir-Whorf hypothesis?
-
Kay, P., Kempton, W., What is the Sapir-Whorf hypothesis? American Anthropologist 86(1), 65-79.
-
American Anthropologist
, vol.86
, Issue.1
, pp. 65-79
-
-
Kay, P.1
Kempton, W.2
-
28
-
-
9944224041
-
Keypad pensions cause problems
-
. 18 May 2003
-
Lusher, A., Keypad pensions cause problems. Sunday Telegraph. 18 May 2003.
-
Sunday Telegraph
-
-
Lusher, A.1
-
30
-
-
9944245320
-
Image memory
-
Yuille, J.C. (Ed.). Lawrence Erlbaum Associates, Hillsdale, NJ
-
Madigan, S., 1983. Image memory, in: Yuille, J.C. (Ed.), Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio. Lawrence Erlbaum Associates, Hillsdale, NJ.
-
(1983)
Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio
-
-
Madigan, S.1
-
31
-
-
9944220341
-
Could I have the menu please?
-
8-12 Sep 2003, Bath, UK 2003
-
McCarthy, J., Sasse, M.A., Riegelsberger, J., 2003. Could I have the menu please? An eye tracking study of design conventions Proceedings of HCI2003, 8-12 Sep 2003, Bath, UK 2003.
-
(2003)
An Eye Tracking Study of Design Conventions Proceedings of HCI2003
-
-
McCarthy, J.1
Sasse, M.A.2
Riegelsberger, J.3
-
36
-
-
9944226025
-
-
24 November 2003. Perth, Western Australia 2003
-
Pierce, J.D., Wells, J.G., Warren, M.J., Mackay, D.R., 2003. A Conceptual Model for Graphical Authentication 1st Australian Information Security Management Conference. 24 November 2003. Perth, Western Australia 2003.
-
(2003)
A Conceptual Model for Graphical Authentication 1st Australian Information Security Management Conference
-
-
Pierce, J.D.1
Wells, J.G.2
Warren, M.J.3
Mackay, D.R.4
-
38
-
-
9944232402
-
Discrimination learning of pictures and words
-
Rowe, E.J., Paivio, A., 1971. Discrimination learning of pictures and words. Psychonomic Science 22 (2), 87-88.
-
(1971)
Psychonomic Science
, vol.22
, Issue.2
, pp. 87-88
-
-
Rowe, E.J.1
Paivio, A.2
-
40
-
-
77950950938
-
-
Papp, G., Posch, R. (Eds.), Wien
-
Smith, S.L., 1987. in: Papp, G., Posch, R. (Eds.), Authenticating Users by Word Association In Proceedings of the Human Factors Society 31st Annual Meeting, Wien pp. 135-138.
-
(1987)
Authenticating Users by Word Association in Proceedings of the Human Factors Society 31st Annual Meeting
, pp. 135-138
-
-
Smith, S.L.1
-
41
-
-
0038402723
-
An attention based similarity measure with application to content based information retrieval
-
Yeung, M.M., Lienhart, R.W., Li, C.-S. (Eds.), 20-24 Jan, Santa Clara
-
Stentiford, F.W.M., 2003. An attention based similarity measure with application to content based information retrieval, in: Yeung, M.M., Lienhart, R.W., Li, C.-S. (Eds.), Storage and Retrieval for Media Databases 2003 Proceedings of SPIE, 20-24 Jan, Santa Clara, vol. 5021.
-
(2003)
Storage and Retrieval for Media Databases 2003 Proceedings of SPIE
, vol.5021
-
-
Stentiford, F.W.M.1
-
43
-
-
84961643054
-
-
Addison-Wesley, Reading, MA
-
Walker, N., Smelcer, J., 1990. A Comparison of Selection Time from Walking and Bar Menus Proceedings of CHI'90. Addison-Wesley, Reading, MA pp. 221-225.
-
(1990)
A Comparison of Selection Time from Walking and Bar Menus Proceedings of CHI'90
, pp. 221-225
-
-
Walker, N.1
Smelcer, J.2
-
44
-
-
9944232890
-
-
Oliver and Boyd Publishers, Edinburgh
-
Weale, R.A., 1968. From Sight to Light. Oliver and Boyd Publishers, Edinburgh.
-
(1968)
From Sight to Light
-
-
Weale, R.A.1
-
45
-
-
0004149567
-
-
Pimlico Publications, London
-
Yates, F.A., 1966. The Art of Memory. Pimlico Publications, London.
-
(1966)
The Art of Memory
-
-
Yates, F.A.1
-
46
-
-
0025545602
-
Cognitive passwords: The key to easy access control
-
Zviran, M., Haga, W.J., 1990. Cognitive passwords: the key to easy access control. Computers and Security 9, 723-736.
-
(1990)
Computers and Security
, vol.9
, pp. 723-736
-
-
Zviran, M.1
Haga, W.J.2
|