1 |
A. H. Lashkari, O. B. Zakaria, S. Farmand, and R. Saleh, "Shoulder surfing attack in graphical password authentication," International Journal of Computer Science and Information Security, vol.6, no.2, pp.145-154, 2009.
|
2 |
W. Jansen, "Authenticating mobile device users through image selection," The Internet Society: Advances in Learning, Commerce and Security, vol.1, pp.183-194, 2004.
|
3 |
Seung-hwan Ju, Hee-suk Seo, "Password Based User Authentication Methodology Using Multi-Input on Multi-Touch Environment," Journal of the Korea Society for Simulation, Vol 20, No 1, 2011.
|
4 |
S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results," in Human-Computer Interaction International (HCII 2005). Las Vegas, NV, 2005.
|
5 |
X. Suo, Y. Zhu, and G. S. Owen, "Graphical passwords: A survey," Proc. of the 21st Annual Computer Security Applications Conference, pp.463-472, 2005.
|
6 |
Hoanca, B. and K. Mock. Screen Oriented Technique for Reducing the Incidence of Shoulder Surfing. In Proceedings of International Conference on Security and Management (SAM). Las Vegas, Nevada, USA, 2005.
|
7 |
RealUser, "www.realuser.com," last accessed in 2012.
|
8 |
S. Akula, V. Devisetty, "Image Based Registration and Authentication System," in Proceedings of Midwest Instruction and Computing Symposium, 2004.
|
9 |
R. Dhamija and A. Perrig, "D'ej'a vu: a user study using images for authentication," in Proc. of the 9th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2000.
|
10 |
Gunyoung Moon, Jonguk Kim, Manpyo Hong, "A Graphical Password Scheme Resistant to Shoulder Surfing Attack in Mobile Environments", Korea Information Science Society, Journal of KISS: Computing Practices and Letters, No. 18 No. 1 page (s): 90-94, 2012.
|