참고문헌
- G, E, Blonder, 'Graphical passwords', United States Patent 5559961, 1996
- S, Brostoff and M, A. Sasse, 'Are Passfaces more usable than passwords: A field trial investigation', In Proceedings of HCI 2000, Springer, pp, 405-424, 2000
- J, Goldberg, J, Hagman and V, Sazawal, 'Doodling Our Way to Better Authentication', In Proceedings of Human Factors in Computing Systems (CHI), 2002 https://doi.org/10.1145/506443.506639
- P, Golle and D, Wagner, 'Cryptoanalysis of a Cognitive Authentication Scheme (Extended Abstract)', In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp, 66-70, 2007 https://doi.org/10.1109/SP.2007.13
- J, P, Hansen, K. Torning, A. S, Johansen, K. Itoh and H, Aoki, 'Gaze Typing Compared with Input by Head and Hand', In Proceedings of Eye Tracking Research & Applications (ETRA) Symposium, ACM, pp, 131-138, 2004 https://doi.org/10.1145/968363.968389
- B, Hoanca and K. Mock, 'Screen Oriented Technique for Reducing the Incidence of Shoulder Surfing', In Proceedings of International Conference on Security and Management (SAM), 2005
- B, Hoanca and K. Mock, 'Secure Graphical Password System for High Traffic Public Areas', In Proceedings of Eye Tracking Research and Applications (ETRA) Symposium, ACM, pp, 35, 2006 https://doi.org/10.1145/1117309.1117319
- D, Hong, S, Man, B, Hawes and M, Mathews, 'A password scheme strongly resistant to spyware', In Proceedings of International Conference on Security and Management, 2002
- W, Jansen, 'Authenticating Users on Handheld Devices', In Proceedings of Canadian Information Technology Security Symposium, 2003
- W, Jansen, S, Gavrila and V, Korolev, 'A Visual Login Technique for Mobile Devices', In National Institute of Standards and Technology Interagency Report (NISTIR) 7030, 2003
- W, Jansen, 'Authenticating Mobile Device User Through Image Selection', In Data Security, 2004
- I, Jermyn, A. Mayer, F, Monrose, M, K. Reiter and A. D, Rubin, 'The Design and Analysis of Graphical Passwords', In Proceedings of the 8th USENIX Security Symposium, 1999
- M, Kumar, T, Garfinkel, D, Boneh and T, Winograd, 'Reducing Shoulder-surfing by Using Gazebased Password Entry', In Proceedings of Symposium on Usable Privacy and Security (SOUPS), ACM, pp, 13-19, July 2007 https://doi.org/10.1145/1280680.1280683
- P, Majaranta and K, J, RaiM, 'Twenty Years of Eye Typing: Systems and Design Issues', In Proceedings of Eye Tracting Research & Application (ETRA) Symposium, ACM, pp, 15-22, 2002 https://doi.org/10.1145/507072.507076
- P, Majaranta, I, S, MacKenzie, A. Aula and K. J, Raiha, 'Auditory and Visual Feedback During Eye Typing', In Proceedings of CHI, ACM, pp, 766-767, 2003, http://www.yorku.ca/mack/chi03d,html
- P, Majaranta, A. Aula and K. J, RaiM, 'Effects of Feedback on Eye Typing with a Short Dwell Time', In Proceedings of Eye Tracting Research & Application (ETRA) Symposium, ACM, pp, 139-146, 2004 https://doi.org/10.1145/968363.968390
- S, Man, D, Hong and M, Mathews, 'A shouldersurfing resistant graphical password scheme', In Proceedings of International Conference on Security and Management (SAM), 2003
- D, Nail and J, Thorpe, 'Analyzing User Choice in Graphical Passwords', Technical Report, School of Information Technology and Engineering, University of Ottawa, May 2004
- X, Suo, Y, Zhu and G, S, Owen, 'Graphical passwords: A survey', In Proceedings of the 21st An nual Computer Security Applications Conference (ASCSAC'05), 2005 https://doi.org/10.1109/CSAC.2005.27
- J. Thorpe and p. C. v. Oorschot, 'Graphical dictionaries and the memorable space of graphical passwords' , In Proceedings of the 13th USENIX security Symposium, 2004
- J. Thorpe and p. C. v. Oorschot, 'Towards secure design choices for implementing graphical passwords', In Proceedings of the 20th Annual Computer Security Applications Conference, IEEE, 2004 https://doi.org/10.1109/CSAC.2004.44
- J. Thorpe, p. C. van Oorschot and A Somayaji. 'Pass-thoughts: authenticationg with our minds', In Proceedings of New Security Paradigms Workshop, ACM, PP. 45-56, 2005 https://doi.org/10.1145/1146269.1146282
- D. Weinshall, 'Cognitive Authentication Schemes Safe Against Spyware (Short Paper)', In Proceedings of IEEE Symposium on Security and Privacy, pp. 295-300, May 2006 https://doi.org/10.1109/SP.2006.10
- S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy and N. Memon, 'PassPoints: design and longitudinal evaluation of a graphical password system', In International Journal of HumanComputer Studies, 63, pp. 102-127, 2005 https://doi.org/10.1016/j.ijhcs.2005.04.010
- S. Wiedenbeck, J. Waters, L. Sobrado and J. C. Birget, 'Design and Evaluation of a ShoulderSurfing Resistant Graphical Password Scheme', In Proceedings of AVI, ACM, pp. 177-184, 2006 https://doi.org/10.1145/1133265.1133303
- H. Zhao and X. Li, 'S3PAS: A Scalable ShoulderSurfing Resistant Textual-Grapbical Password Authentication Scheme', In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AlNAW 07), IEEE, pp. 467-472, 2007
- Z. Zheng, X. Liu, L. Yin and Z. Liu, 'A Strokebased Textual Password Authentication Scheme', In Proceedings of the 1st International Workshop on Education Technology and Computer Science, IEEE, pp. 90-95, 2009 https://doi.org/10.1109/ETCS.2009.544
- The EyeGaze Communication System, 2009 by LC Technologies, Inc., http://www.eyegaze.com
- PassFaces: patented technology that uses the brain's natural power to recognize familiar faces, PassFaces corporation, http://www.passfaces.com
- MyTobii Communication System, 2008 Tobii Technology AB, http://www.tobii.com