1 |
X. Suo, Y. Zhu, and G.S. Owen, 'Graphical Passwords: A Survey,' In Proceedings of 21st Annual Computer Security Applications Conference (ACSAC), pp. 463-472, 2005
|
2 |
D. Weinshall and S. Kirpatrik, 'Passwords You'll Never Forget, but Can't Recall,' In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI), pp. 1399-1402, 2004
|
3 |
PassfacesTM, httpi//www.realuser.com
|
4 |
T. Valentine, 'An evaluation of the Passface personal authentication system,' Technical Report, Goldsmiths College, University of London, 1998
|
5 |
R. Dhamija and A. Perrig, 'Deja Vu: A User Study Using Images for Authentication,' In Proceedings of 9th USENIX Security Symposium, 2000
|
6 |
L, Sobrado and J.C, Birget, 'Graphical passwords,' The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, Vol. 4, 2002
|
7 |
P, Golle and D. Wagner, 'Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract),' In Proceedings of the IEEE Symposium on Security and Privacy (S&P), pp. 66-70, 2007
|
8 |
C.H. Wang, T. Hwang, and J.J. Tsai, 'On the Matsumoto and Imai's Human Identification Scheme,' Advances in Cryptology - EUROCRYT, LNCS 921, pp. 382-392, 1995
|
9 |
T. Matsumoto, 'Human-Computer Cryptography: An Attempt,' In Proceedings of ACM Conference on Computer and Communications Security (CCS), 1996
|
10 |
H. Zhao and X. Li, 'S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme,' In Proceedings of 21st IEEE International Conference on Advanced Information Networking and Applications Workshop (AINAW), 2007
|
11 |
H. Jameel, R.A. Shaikh, H. Lee, and S. Lee, 'Human Identification Through Image Evaluation Using Secret Predicates,' In Proceedings of The Cryptographer's Track at RSA Conference (CT-RSA), LNCS 4377, pp. 67-84, 2007
|
12 |
J. Thorpe and P.C. van Oorschot, 'Graphical Dictionaries and the Mernorable Space of Graphical Passwords,' In Proceedings of the 13th USENIK Security Symposium, 2004
|
13 |
N. Hopper and M. Blum, 'Secure Human Identification Protocols,' In Proceeding of ASIACRYPT, LNCS 2248, pp. 52-66, 2001
|
14 |
T. Kwon, 'Practical Authenticated Key Agreement Using Passwords,' In Proceedings of 7th International Conference Information Security (ISC), LNCS 3225, pp. 1-12, 2004
|
15 |
T. Matumoto and H. Imai, 'Human Identification Through Insecure Channel,' Advances in Cryptology EUROCRYT, LNCS 547, pp. 402-421, 1991
|
16 |
S. Brostoff and M.A. Sasse, 'Are Passfaces More Usable Than Passwords? A Field Trial Investigation,' In People and Computers XIV - Usability or Else! Proceedings of HCI, 2000
|
17 |
T. Valentine, 'Memory for Passfaces after a Long Delay,' Technical Report, Goldsmiths College, University of London, 1999
|
18 |
S. Wiedenbeck,J. Waters,J.C. Birget, A. Brodskily, and N. Memon, 'Authentication using graphical passwords: Basic results,' In Proceedings of Human-Computer Interaction International (HCII), 2005
|
19 |
S. Wiedenbeck,J. Waters,J.C. Birget. A, Brodskily, and N. Memon, 'Authentication using graphical passwords: Effects of tolerance and image choice,' In Proceedings of ACM Symposium on Usable Privacy and Security (SOUPS), 2005
|
20 |
X. Y. Li and S.H. Teng, 'Practical Human-Machine Identification over Insecure Channels,' Journal of Combinational Optimization, Kluwer Academic Publishers, Vol. 3, No. 4, 1999
|
21 |
D. Davis, F. Monrose, and M. K. Reiter, 'On User Choice in Graphical Password Schemes,' In Proceedings of the 13th USENIK Security Symposium, 2004
|
22 |
S. Man, D. Hong, B. Hayes, and M, Matthews, 'A Password Scheme Strongly Resistant to Spyware,' In Proceedings of International Conference on Security and Management, pp. 94-100, 2004
|
23 |
S. Wiedenbeck,J. Waters,J.C. Birget, A. Brodskily, and N. Memon, 'PassPoints: Design and longitudinal evaluation of a graphical passwords system,' International Journal of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), Vol. 63, pp. 102-127, 2005
DOI
ScienceOn
|
24 |
S. Man, D. Hong, and M. Matthews, 'A ShoulderSurfing Resistant Graphical Password Scheme - WIW,' In Proceedings of International Conference on Security and Managernent, pp. 105-111, 2003
|
25 |
A.E, Dirik, N. Memon, and J.C, Birget, 'Modeling user choice in the PassPoints graphical password scheme,' In Proceedings of ACM Symposium on Usable Privacy and Security (SOUPS), 2007
|
26 |
I. Jermynn, A. Mayer, F. Monrose, M.K. Reiter, and A.D. Rubin, 'The Design and Analysis of Graphical Passwords,' In Proceedings of the 8th USENIK Security Symposium, 1999
|
27 |
S. Bellovin and M. Merritt, 'Encrypted key exchange: password-based protocols secure against dictionary attacks,' In Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992
|
28 |
A. De Angeli, M. Coutts, L. Coventry, D. Cameron, G.I. Johnson, and M. Fischer, 'VIP: A visual approach to user authentication,' In Proceedings of Advanced Visual Interfaces (AVI), 2002
|
29 |
A. Perrig and D. Song, 'Hash Visualization: A New Technique to Improve Real-World Security,' In Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce, 1999
|
30 |
J. Thorpe and P.C. van Oorschot, 'Towards Secure Design Choices for Implementing Graphical Passwords,' In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), 2004
|
31 |
D. Weinshall, 'Cognitive Authentication Schemes Safe Against Spyware (Short Paper),' In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2006
|
32 |
S. Wiedenbeck,J. Waters, L. Sobrado, and J. C. Birget, 'Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme,' In Proceedings of Advanced Visual Interfaces (AVI), 2006
|