1 |
X. Suo, Y. Zhu, and G.S. Owen, "Graphical passwords: a survey," Proceedings of the 21st Annual Computer Security Applications Conference, pp. 463-472, Dec. 2005.
|
2 |
E.K. Vogel and M.G. Machizawa, "Neural activity predicts individual differences in visual working memory capacity," Nature 428, pp. 748-751, Apr. 2004.
DOI
ScienceOn
|
3 |
P. Golle and D. Wagner, "Cryptanalysis of a cognitive authentication schme," Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 66-70, May 2007.
|
4 |
H. Jameel, R.A. Shaikh, H. Lee, and S. Lee, "Human identification through image evaluation using secret predicates," Proceedings of the Cryptographer's Track at RSA Conference, LNCS 4377, pp. 67-84, 2007.
|
5 |
D. Weinshall, "Cognitive authentication schemes safe against spyware," Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 1-16, May 2006.
|
6 |
S. Wiedenbeck, J. Waters, L. Sobrado, and J. Birget, "Design and evaluation of a shoulder- surfing resistant graphical password scheme," Proceedings of the Advanced Visual Interfaces, pp. 177-184, May 2006.
|
7 |
H. Zhao and X. Li, "S3PAS: a scalable shoulder-surfing resistant textual-graphical password authentication scheme," Proceedings of the 21st IEEE International Conference on Advanced Information Networking and Applications Workshops, vol. 2, pp. 467-472, May 2007.
|