References
- K. P. L. Vu, R. W. Proctor, A. Bhargav-Spantzel, B.-L. Tai, J. Cook & E. E. Schultz. (2007). Password Security and Memorability to Protect Personal and Organizational Information. International Journal of Human-Computer Studies, 65(8), 744-757. https://doi.org/10.1016/j.ijhcs.2007.03.007
- A. S. Brown, E. Bracken, S. Zoccoli & K. Douglas. (2004). Generating and remembering passwords. Applied Cognitive Psychology, 18(6), 641-651. https://doi.org/10.1002/acp.1014
- R. Biddle. S. Chiasson & P. C. Van Oorschot. (2012). Graphical passwords: Learning from the first twelve years. ACM Computing Surveys, 44(4), 1-41.
- L. Standing, J. Conezio & R. N. Haber. (1970). Perception and Memory for Pictures: Single-trial Learning of 2500 Visual Stimuli. Psychonomic Science, 19(2), 73-74. https://doi.org/10.3758/BF03337426
- S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot & R. Biddle. (2009). Multiple Password Interference in Text Passwords and Click-based Graphical Passwords. CCS'09, (pp. 500-511). New York : ACM.
- B. Kirkpatrick. (1894). An experimental study of memory. Psychological Review, 1, 602-609. https://doi.org/10.1037/h0068244
- S. Madigan. (1983). Picture memory. Essays in Honor of Allan Paivio, chapter3, (pp. 65-89). Hillsdale : Lawrence Erlbaum Associates.
- A. Paivio, T. Rogers & P. C. Smythe. (1968). Why are pictures easier to recall than words?. Psychonomic Science, 11, 137-138. https://doi.org/10.3758/BF03331011
- R. Shepard. (1967). Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior, 6, 156-163. https://doi.org/10.1016/S0022-5371(67)80067-7
- G. H. Bower, M. B. Karlin & A. Dueck (1975). Comprehension and memory for pictures. Memory and Cognition, 3, 216-220. https://doi.org/10.3758/BF03212900
- L. Standing. (1973). Learning 10,000 pictures. Quarterly Journal of Experimental Psychology, 25, 207-222. https://doi.org/10.1080/14640747308400340
- E. Von Zezschwitz, A. De Luca, P. Janssen & H. Hussmann. (2015). Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns. CHI '15, (pp. 2339-2342). New York : ACM.
- A. J. Aviv, K. Gibson, E. Mossop, M. Blaze & J.M. Smith. (2010). Smudge attacks on smartphone touch screens. WOOT'10, USENIX, (pp. 2339-2342). CA : Association Berkeley.
- Z. X. Jin & Y. H. Pan. (2016). A Taxonomy of Uninterpretable Interactions from Interaction Design Perspective. Journal of the Ergonomic Society of Korea, 52(1), 53-65. DOI : 10.5143/JESK.2016.35.1.53
- L. Tao. (2018). Interaction Design Language. Beijing : Tsinghua University Press.
- K. Kim & J. H. Kim. (2018). A Development of an Low Cost Smart Parcel Service System with Enhanced Security. Journal of Convergence for Information Technology, 8(6), 193-199. DOI : 10.22156/CS4SMB.2018.8.6.193
- S. Hong. (2019). Security Vulnerability and Countermeasure on 5G Networks : Survey. Journal of Digital Convergence, 17(12), 197-202. https://doi.org/10.14400/JDC.2019.17.12.197
- S. Hong. (2018). Research on Security Model and Requirements for Fog Computing : Survey. Journal of the Korea Convergence Society, 9(5), 27-32. https://doi.org/10.15207/JKCS.2018.9.5.027