1 |
A. Adams and M. A. Sasse, "Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, pp.40-46, 1999.
DOI
|
2 |
R. N. Shepard, "Recognition memory for words, sentences and pictures 1," Journal of Verbal Learning and Verbal Behavior, vol. 6, pp.156-163, 1967.
DOI
|
3 |
Aviv, Adam J. Gibson, Katherine, Mossop, Evan, Blaze, Matt, Smith, Jonathan M., "Smudge Attacks on Smartphone Touch Screens," in Proc. of 4th USENIX Workshop on Offensive Technologies.
|
4 |
S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," International Journal of Human Computer Studies, vol. 63, pp. 102-127, 2005.
DOI
|
5 |
T. Seong, G.-W. Park and Y.-S. Byun, "A Study on Graphical Passwords," in Proc. of 26th KIPS Fall Conference, vol. 13, no. 2, 2006.
|
6 |
J.-W. Kim, S.-H. Kim, K. Kim and H.-G. Cho, "A Shoulder-Surfing Resistant Graphical Password Using Hangul Choseong," in Proc. of KISS Fall Conference, vol. 37, no. 2(A), pp. 95-96, 2010.
|
7 |
G.-C. Yang and H. Kim, "A New Graphical Password Scheme Based on Universal Design," Journal of Digital Convergence, vol. 12, no. 5, pp. 231-238, 2014.
DOI
|
8 |
S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results," in Proc. of Human-Computer Interaction International (HCII 2005), Las Vegas, NV, 2005.
|
9 |
G.-C. Yang, "PassPositions: A Secure and User-Friendly Graphical Password Scheme," in Proc. of the 4th International Conference on Computer Applications and Information Processing Technology (CAIPT) 2017, Bali, 2017.
|
10 |
Rachna Dhamija, Adrian Perrig, Deja Vu, "A User Study Using Images for Authentication," in Proc. of the 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000.
|
11 |
J. An, S. Kim, A. Kim and S.-H. Lee, "A Melody-based Authentication Scheme by using Piano Key and Score," in Proc. of the Korea Computer Conference, vol. 39, no. 1(C), 2012.
|
12 |
Kirkpatrick, E. A., "An experimental study of memory," Psychological Review, 1, 602-609, 1894.
DOI
|
13 |
S. Madigan, "Picture memory," In J. Yuille, editor, Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio, chapter 3, pages 65-89, Lawrence Erlbaum Associates, 1983.
|
14 |
J.-W. Kim, S.-H. Kim, K. Kim and H.-G. Cho, "Improvement of the Grid-based Password System Resistant to Shoulder-Surfing Attacks, "Journal of KISS, vol. 17, no. 4, 2011.
|
15 |
G. Moon, J. Kim and M. Hong, "A Graphic Password Scheme using Eulerian Path," in Proc. of the Korea Computer Conference, vol. 38, no. 1(D), 2011.
|
16 |
G. Moon, J. Kim and M. Hong, "A Graphical Password Scheme Resistant to Shoulder-Surfing Attack in Mobile Environments," Journal of KISS, vol. 18, no. 1, 2012.
|
17 |
T. Kim, S. Kim, E. Park and J.H. Yi, "Minesweeper Game Based Password Authentication Scheme Resistant to Shoulder-Surfing Attack," in Proc. of 37th KIPS Spring Conference, vol. 19, no. 1, pp. 654-657, 2012.
|
18 |
G. Park, A. Kim and S.-H. Lee, "A Graphic Password Scheme based on Structure of Double Rings Resistant to Smudge and Shoulder Surfing Attack," in Proc. of the Korea Computer Conference, vol. 39, no. 1(C), 2012.
|
19 |
T. Ko, T. Shon and M. Hong, "A Study on the Korean-Stroke based Graphical Password Approach," Journal of KIISC, vol. 22, no. 2, pp. 189-200, 2012.
|
20 |
S.-H. Ju and H.-S. Seo, "A study on User Authentication Technology of Numeric based Pattern Password," Journal of the Korea Society of Computer and Information, vol. 17, no. 9, pp. 65-73, 2012.
DOI
|
21 |
T.E. Kim, H.H. Kim and M.S. Jun, "A study on the SmartPhone GPS based Graphical Password Approach," KIPS Transactions on Computer and Communications System, vol. 2, no. 12, pp. 525-532, 2013.
DOI
|
22 |
H. Jeong, A. Kim and S.-H Lee, "A Text-based Graphical Password by Using Titles on Book Covers," in Proc. of the Korea Computer Conference, vol. 41, no. 1, pp. 2000-2002, 2014.
|