Browse > Article

인지 및 역할 기반 사용자 인증 기법  

Gang, Jeon-Il (인하대학교)
Yang, Dae-Heon (인하대학교)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 X. Suo, Y. Zhu, and G.S. Owen, 'Graphical Passwords: A Survey,' In Proceedings of 21st Annual Computer Security Applications Conference (ACSAC), pp. 463-472, 2005
2 D. Weinshall and S. Kirpatrik, 'Passwords You'll Never Forget, but Can't Recall,' In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI), pp. 1399-1402, 2004
3 PassfacesTM, httpi//www.realuser.com
4 T. Valentine, 'An evaluation of the Passface personal authentication system,' Technical Report, Goldsmiths College, University of London, 1998
5 R. Dhamija and A. Perrig, 'Deja Vu: A User Study Using Images for Authentication,' In Proceedings of 9th USENIX Security Symposium, 2000
6 L, Sobrado and J.C, Birget, 'Graphical passwords,' The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, Vol. 4, 2002
7 P, Golle and D. Wagner, 'Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract),' In Proceedings of the IEEE Symposium on Security and Privacy (S&P), pp. 66-70, 2007
8 C.H. Wang, T. Hwang, and J.J. Tsai, 'On the Matsumoto and Imai's Human Identification Scheme,' Advances in Cryptology - EUROCRYT, LNCS 921, pp. 382-392, 1995
9 T. Matsumoto, 'Human-Computer Cryptography: An Attempt,' In Proceedings of ACM Conference on Computer and Communications Security (CCS), 1996
10 H. Zhao and X. Li, 'S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme,' In Proceedings of 21st IEEE International Conference on Advanced Information Networking and Applications Workshop (AINAW), 2007
11 H. Jameel, R.A. Shaikh, H. Lee, and S. Lee, 'Human Identification Through Image Evaluation Using Secret Predicates,' In Proceedings of The Cryptographer's Track at RSA Conference (CT-RSA), LNCS 4377, pp. 67-84, 2007
12 J. Thorpe and P.C. van Oorschot, 'Graphical Dictionaries and the Mernorable Space of Graphical Passwords,' In Proceedings of the 13th USENIK Security Symposium, 2004
13 N. Hopper and M. Blum, 'Secure Human Identification Protocols,' In Proceeding of ASIACRYPT, LNCS 2248, pp. 52-66, 2001
14 T. Kwon, 'Practical Authenticated Key Agreement Using Passwords,' In Proceedings of 7th International Conference Information Security (ISC), LNCS 3225, pp. 1-12, 2004
15 T. Matumoto and H. Imai, 'Human Identification Through Insecure Channel,' Advances in Cryptology EUROCRYT, LNCS 547, pp. 402-421, 1991
16 S. Brostoff and M.A. Sasse, 'Are Passfaces More Usable Than Passwords? A Field Trial Investigation,' In People and Computers XIV - Usability or Else! Proceedings of HCI, 2000
17 T. Valentine, 'Memory for Passfaces after a Long Delay,' Technical Report, Goldsmiths College, University of London, 1999
18 S. Wiedenbeck,J. Waters,J.C. Birget, A. Brodskily, and N. Memon, 'Authentication using graphical passwords: Basic results,' In Proceedings of Human-Computer Interaction International (HCII), 2005
19 S. Wiedenbeck,J. Waters,J.C. Birget. A, Brodskily, and N. Memon, 'Authentication using graphical passwords: Effects of tolerance and image choice,' In Proceedings of ACM Symposium on Usable Privacy and Security (SOUPS), 2005
20 X. Y. Li and S.H. Teng, 'Practical Human-Machine Identification over Insecure Channels,' Journal of Combinational Optimization, Kluwer Academic Publishers, Vol. 3, No. 4, 1999
21 D. Davis, F. Monrose, and M. K. Reiter, 'On User Choice in Graphical Password Schemes,' In Proceedings of the 13th USENIK Security Symposium, 2004
22 S. Man, D. Hong, B. Hayes, and M, Matthews, 'A Password Scheme Strongly Resistant to Spyware,' In Proceedings of International Conference on Security and Management, pp. 94-100, 2004
23 S. Wiedenbeck,J. Waters,J.C. Birget, A. Brodskily, and N. Memon, 'PassPoints: Design and longitudinal evaluation of a graphical passwords system,' International Journal of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security), Vol. 63, pp. 102-127, 2005   DOI   ScienceOn
24 S. Man, D. Hong, and M. Matthews, 'A ShoulderSurfing Resistant Graphical Password Scheme - WIW,' In Proceedings of International Conference on Security and Managernent, pp. 105-111, 2003
25 A.E, Dirik, N. Memon, and J.C, Birget, 'Modeling user choice in the PassPoints graphical password scheme,' In Proceedings of ACM Symposium on Usable Privacy and Security (SOUPS), 2007
26 I. Jermynn, A. Mayer, F. Monrose, M.K. Reiter, and A.D. Rubin, 'The Design and Analysis of Graphical Passwords,' In Proceedings of the 8th USENIK Security Symposium, 1999
27 S. Bellovin and M. Merritt, 'Encrypted key exchange: password-based protocols secure against dictionary attacks,' In Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992
28 A. De Angeli, M. Coutts, L. Coventry, D. Cameron, G.I. Johnson, and M. Fischer, 'VIP: A visual approach to user authentication,' In Proceedings of Advanced Visual Interfaces (AVI), 2002
29 A. Perrig and D. Song, 'Hash Visualization: A New Technique to Improve Real-World Security,' In Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce, 1999
30 J. Thorpe and P.C. van Oorschot, 'Towards Secure Design Choices for Implementing Graphical Passwords,' In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), 2004
31 D. Weinshall, 'Cognitive Authentication Schemes Safe Against Spyware (Short Paper),' In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2006
32 S. Wiedenbeck,J. Waters, L. Sobrado, and J. C. Birget, 'Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme,' In Proceedings of Advanced Visual Interfaces (AVI), 2006