References
- R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
- M. Kotadia, "Microsoft: Write down your passwords," in ZDNet Australia, May 23, 2005.
- A. Jain, L. Hong, and S. Pankanti, "Biometric identification," Communications of the ACM, vol. 33, pp. 168-176, 2000.
- Blonder, G., "Graphical passwords," in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
- Ronald L. Mace, Graeme J. Hardie, Jaine P. Place, Accessible Environments: Toward Universal Design, a chapter in Design Intervention: Toward a More Humane Architecture, W.E. Preiser, JC. Vischer, E.T. White (Eds.). Van Nostrand Reinhold, New York, 1991.
- Xiaoyuan Suo Ying Zhu G. Scott., Graphical Passwords: A Survey, In 21st Annual Computer Security Applications Conference(ACSAC), 2005.12.
- S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," International Journal of Human Computer Studies, 63, pp. 102-127, 2005 https://doi.org/10.1016/j.ijhcs.2005.04.010
- S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results," in Human-Computer Interaction International (HCII 2005). Las Vegas, NV, 2005
- A. E. Dirik, N. Memon, J.C. Birget, "Modeling user choice in the PassPoints graphical password scheme", Symposium on Usable Privacy and Security(SOUPS), at Carnegie-Mellon Univ., Pittsburgh, July 2007
- D. Hong, S. Man, B. Hawes, and M. Mathews, "A password scheme strongly resistant to spyware," in Proceedings of International conference on security and management. Las Vegas, NV, 2004.
- S. Man, D. Hong, and M. Mathews, "A shoulder surfing resistant graphical password scheme," in Proceedings of International conference on security and management. Las Vegas, NV, 2003.
- I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords," in Proceedings of the 8th USENIX Security Symposium, 1999.
- J. Thorpe and P. C. v. Oorschot, "Graphical Dictionaries and the Memorable Space of Graphical Passwords," in Proceedings of the 13th USENIX Security Symposium. San Deigo, USA: USENIX, 2004.
- A. F. Syukri, E. Okamoto, and M. Mambo, "A User Identification System Using Signature Written with Mouse," in Third Australasian Conference on Information Security and Privacy (ACISP): SpringerVerlag Lecture Notes in Computer Science (1438), 1998, pp. 403-441
- Ahmad Almulhem, "A Graphical Password Authentication System", World Congress on Internet Security (WorldCIS-2011), London, UK, February 21-23, 2011.
Cited by
- Implementation of a Graphical Password Authentication System 'PassPositions' vol.6, pp.2, 2018, https://doi.org/10.18178/joig.6.2.117-121