On the Security of Picture Gesture Authentication
暂无分享,去创建一个
Ziming Zhao | Gail-Joon Ahn | Hongxin Hu | Jeong-Jin Seo | Gail-Joon Ahn | Hongxin Hu | Ziming Zhao | Jeong-Jin Seo
[1] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] László Lovász,et al. Approximating Min Sum Set Cover , 2004, Algorithmica.
[3] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[4] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[5] Julie Thorpe,et al. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords , 2007, USENIX Security Symposium.
[6] Julie Thorpe,et al. On Purely Automated Attacks and Click-Based Graphical Passwords , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[7] Nasir D. Memon,et al. Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.
[8] Robert Biddle,et al. Graphical passwords: Learning from the first twelve years , 2012, CSUR.
[9] George R. S. Weir,et al. People and Computers IX: Crafting Interaction: Styles, Metaphors, Modalities and Agents , 1994 .
[10] Nasir D. Memon,et al. Modeling user choice in the PassPoints graphical password scheme , 2007, SOUPS '07.
[11] Alain Forget,et al. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism , 2012, IEEE Transactions on Dependable and Secure Computing.
[12] Lujo Bauer,et al. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms , 2011, 2012 IEEE Symposium on Security and Privacy.
[13] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[14] A. Efland,et al. Art and cognition , 2002 .
[15] Jeff Yan,et al. Do background images improve "draw a secret" graphical passwords? , 2007, CCS '07.
[16] Kemal Bicakci,et al. Towards Usable Solutions to Graphical Password Hotspot Problem , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[17] Julie Thorpe,et al. On predictive models and user-drawn graphical passwords , 2008, TSEC.
[18] Julie Thorpe,et al. Towards secure design choices for implementing graphical passwords , 2004, 20th Annual Computer Security Applications Conference.
[19] M. Angela Sasse,et al. Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.
[20] Michael K. Reiter,et al. On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.
[21] Thomas Deselaers,et al. Measuring the Objectness of Image Windows , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Alain Forget,et al. Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords , 2010, CHI.
[23] Keiichi Abe,et al. Topological structural analysis of digitized binary images by border following , 1985, Comput. Vis. Graph. Image Process..
[24] Julie Thorpe,et al. Graphical Dictionaries and the Memorable Space of Graphical Passwords , 2004, USENIX Security Symposium.
[25] Dana H. Ballard,et al. Generalizing the Hough transform to detect arbitrary shapes , 1981, Pattern Recognit..
[26] Claude Castelluccia,et al. Adaptive Password-Strength Meters from Markov Models , 2012, NDSS.
[27] Ross J. Anderson,et al. A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs , 2012, Financial Cryptography.
[28] Luc Van Gool,et al. The 2005 PASCAL Visual Object Classes Challenge , 2005, MLCW.
[29] Stuart E. Schechter,et al. The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[30] Xiaoping Chen,et al. YAGP: Yet Another Graphical Password Strategy , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[31] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[32] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[33] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[34] Julie Thorpe,et al. Exploiting predictability in click-based graphical passwords , 2011, J. Comput. Secur..
[35] Alain Forget,et al. User interface design affects security: patterns in click-based graphical passwords , 2009, International Journal of Information Security.
[36] Michael K. Reiter,et al. The security of modern password expiration: an algorithmic framework and empirical analysis , 2010, CCS '10.
[37] David Griffiths,et al. Shoulder surfing defence for recall-based graphical passwords , 2011, SOUPS.
[38] Robert Biddle,et al. Graphical Password Authentication Using Cued Click Points , 2007, ESORICS.