From hot-spots towards experience-spots: Leveraging on users' sociocultural experiences to enhance security in cued-recall graphical authentication
暂无分享,去创建一个
Marios Belk | Andreas Pitsillides | Christos Fidas | Ting Han | Argyris Constantinides | Anna Maria Pietron | A. Pitsillides | C. Fidas | Marios Belk | Ting Han | Argyris Constantinides
[1] Borka Jerman-Blazic,et al. Why That Picture? Discovering Password Properties in Recognition-Based Graphical Authentication , 2016, Int. J. Hum. Comput. Interact..
[2] Julie Thorpe,et al. Purely Automated Attacks on PassPoints-Style Graphical Passwords , 2010, IEEE Transactions on Information Forensics and Security.
[3] Jeff Yan,et al. Do background images improve "draw a secret" graphical passwords? , 2007, CCS '07.
[4] Konstantin Beznosov,et al. Know your enemy: the risk of unauthorized access in smartphones by insiders , 2013, MobileHCI '13.
[5] Robert Biddle,et al. Graphical passwords: Learning from the first twelve years , 2012, CSUR.
[6] Marios Belk,et al. FlexPass: Symbiosis of Seamless User Authentication Schemes in IoT , 2019, CHI Extended Abstracts.
[7] Mor Naaman,et al. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.
[8] Michael K. Reiter,et al. On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.
[9] Marios Belk,et al. On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords , 2019, UMAP.
[10] Steven Furnell,et al. Why users cannot use security , 2005, Comput. Secur..
[11] Alireza Sahami Shirazi,et al. Graphical Passwords in the Wild: Understanding How Users Choose Pictures and Passwords in Image-based Authentication Schemes , 2015, MobileHCI.
[12] Marios Belk,et al. Sweet-spotting security and usability for intelligent graphical authentication mechanisms , 2017, WI.
[13] Cengiz Acartürk,et al. The Role of Visual Coherence in Graphical Passwords , 2013, CogSci.
[14] Marios Belk,et al. Using Eye Gaze Data and Visual Activities to Infer Human Cognitive Styles: Method and Feasibility Studies , 2017, UMAP.
[15] Ziming Zhao,et al. On the Security of Picture Gesture Authentication , 2013, USENIX Security Symposium.
[16] Nicolas Christin,et al. Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes , 2011, CHI.
[17] T. B. Rogers,et al. Self-reference and the encoding of personal information. , 1977, Journal of personality and social psychology.
[18] Thomas S. Tullis,et al. Can users remember their pictorial passwords six years later , 2011, CHI EA '11.
[19] Sven Grawunder,et al. The phonetic profile of Korean formal and informal speech registers , 2012, J. Phonetics.
[20] Tsuhan Chen,et al. A visual dictionary attack on Picture Passwords , 2013, 2013 IEEE International Conference on Image Processing.
[21] Nikolaos M. Avouris,et al. Using Eye Tracking to Identify Cognitive Differences: A Brief Literature Review , 2016, PCI.
[22] M. Erez,et al. A Dynamic, Multi‐Level Model of Culture: From the Micro Level of the Individual to the Macro Level of a Global Culture , 2004 .
[23] Bruce L. Riddle,et al. Passwords in use in a university timesharing environment , 1989, Comput. Secur..
[24] Marios Belk,et al. A Cross-cultural Perspective for Personalizing Picture Passwords , 2020, UMAP.
[25] Tadayoshi Kohno,et al. A comprehensive study of frequency, interference, and training of multiple graphical passwords , 2009, CHI.
[26] Florian Alt,et al. The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions , 2020, CHI.
[27] Panagiotis Germanakos,et al. The interplay between humans, technology and user authentication: A cognitive processing perspective , 2017, Comput. Hum. Behav..
[28] Michael Weber,et al. Exploring the design space of graphical passwords on smartphones , 2013, SOUPS.
[29] Konstantin Beznosov,et al. Does my password go up to eleven?: the impact of password meters on password selection , 2013, CHI.
[30] Robert Biddle,et al. Graphical Password Authentication Using Cued Click Points , 2007, ESORICS.
[31] Alain Forget,et al. Influencing users towards better passwords: persuasive cued click-points , 2008, BCS HCI.
[32] Raymond Chang,et al. Content-specific activity in frontoparietal and default-mode networks during prior-guided visual perception , 2018, eLife.
[33] Julie Thorpe,et al. The presentation effect on graphical passwords , 2014, CHI.
[34] Ziming Zhao,et al. Picture Gesture Authentication , 2015, ACM Trans. Inf. Syst. Secur..
[35] S. B. Hutton,et al. Eye Tracking Methodology , 2019, Eye Movement Research.
[36] Marios Belk,et al. “I Recall this Picture”: Understanding Picture Password Selections based on Users’ Sociocultural Experiences , 2019, 2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI).
[37] Elizabeth Stobert,et al. Memory retrieval and graphical passwords , 2013, SOUPS.
[38] Albrecht Schmidt,et al. Increasing the security of gaze-based cued-recall graphical passwords using saliency masks , 2012, CHI.
[39] Marios Belk,et al. On sociocultural-centered graphical passwords: an initial framework , 2018, MobileHCI Adjunct.
[40] Marios Belk,et al. Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition , 2018, CHI.
[41] D. Bates,et al. Fitting Linear Mixed-Effects Models Using lme4 , 2014, 1406.5823.
[42] Julie Thorpe,et al. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords , 2007, USENIX Security Symposium.
[43] Julie Thorpe,et al. Exploiting predictability in click-based graphical passwords , 2011, J. Comput. Secur..
[44] Nasir D. Memon,et al. Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.
[45] Vito Di Gesù,et al. A fuzzy approach to the evaluation of image complexity , 2009, Fuzzy Sets Syst..
[46] Nicolas Christin,et al. Use Your Illusion: secure authentication usable anywhere , 2008, SOUPS '08.
[47] Marios Belk,et al. On Cultural-centered Graphical Passwords: Leveraging on Users' Cultural Experiences for Improving Password Memorability , 2018, UMAP.
[48] Marios Belk,et al. An eye gaze-driven metric for estimating the strength of graphical passwords based on image hotspots , 2020, IUI.
[49] E. Tulving,et al. Episodic and semantic memory , 1972 .
[50] Karen Renaud,et al. On user involvement in production of images used in visual authentication , 2009, J. Vis. Lang. Comput..
[51] Thomas S. Tullis,et al. Using personal photos as pictorial passwords , 2005, CHI Extended Abstracts.
[52] Yael Pritch,et al. Saliency filters: Contrast based filtering for salient region detection , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[53] Marios Belk,et al. Influences of Mixed Reality and Human Cognition on Picture Passwords: An Eye Tracking Study , 2019, INTERACT.
[54] Borka Jerman-Blazic,et al. On designing usable and secure recognition-based graphical authentication mechanisms , 2011, Interact. Comput..
[55] A. Paivio,et al. Picture superiority in free recall: Imagery or dual coding? , 1973 .