Exploring the Potential of GeoPass: A Geographic Location-Password Scheme

[1]  Heinrich Hußmann,et al.  Using fake cursors to secure on-screen password entry , 2013, CHI.

[2]  Julie Thorpe,et al.  Analyzing User Choice in Graphical Passwords , 2004 .

[3]  Cormac Herley,et al.  Do Strong Web Passwords Accomplish Anything? , 2007, HotSec.

[4]  Robert Biddle,et al.  Do you see your password?: applying recognition to textual passwords , 2012, SOUPS.

[5]  Mahdi N. Al-Ameen,et al.  The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords , 2015, SOUPS.

[6]  Blase Ur,et al.  Correct horse battery staple: exploring the usability of system-assigned passphrases , 2012, SOUPS.

[7]  Robert Biddle,et al.  Graphical passwords: Learning from the first twelve years , 2012, CSUR.

[8]  Matthew Smith,et al.  Where Have You Been? Using Location-Based Security Questions for Fallback Authentication , 2015, SOUPS.

[9]  Dino Schweitzer,et al.  A security class project in graphical passwords , 2010 .

[10]  Nasir D. Memon,et al.  Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.

[11]  Mahdi N. Al-Ameen,et al.  Leveraging Real-Life Facts to Make Random Passwords More Memorable , 2015, ESORICS.

[12]  Mahdi N. Al-Ameen,et al.  Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues , 2015, CHI.

[13]  Robert Biddle,et al.  Facing the facts about image type in recognition-based graphical passwords , 2011, ACSAC '11.

[14]  David Mazières,et al.  A future-adaptive password scheme , 1999 .

[15]  Nikita Borisov,et al.  The Tangled Web of Password Reuse , 2014, NDSS.

[16]  Hung-Min Sun,et al.  PassMap: a map based graphical-password authentication system , 2012, ASIACCS '12.

[17]  Ian Oakley,et al.  PassBYOP: Bring Your Own Picture for Securing Graphical Passwords , 2016, IEEE Transactions on Human-Machine Systems.

[18]  Blase Ur,et al.  "I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab , 2015, SOUPS.

[19]  Alain Forget,et al.  Improving text passwords through persuasion , 2008, SOUPS '08.

[20]  F. Craik,et al.  Depth of processing and the retention of words , 1975 .

[21]  Blase Ur,et al.  Do Users' Perceptions of Password Security Match Reality? , 2016, CHI.

[22]  Xiang Cao,et al.  Enabling concurrent dual views on common LCD screens , 2012, CHI.

[23]  Heinrich Hußmann,et al.  Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns , 2015, CHI.

[24]  Lujo Bauer,et al.  Encountering stronger password requirements: user attitudes and behaviors , 2010, SOUPS.

[25]  Wanli Ma,et al.  Impact of restrictive composition policy on user password choices , 2011, Behav. Inf. Technol..

[26]  Heinrich Hußmann,et al.  SwiPIN: Fast and Secure PIN-Entry on Smartphones , 2015, CHI.

[27]  Alain Forget,et al.  User interface design affects security: patterns in click-based graphical passwords , 2009, International Journal of Information Security.

[28]  Matthew K. Wright,et al.  A study of user password strategy for multiple accounts , 2013, CODASPY '13.

[29]  Robert Biddle,et al.  A second look at the usability of click-based graphical passwords , 2007, SOUPS '07.

[30]  Alain Forget,et al.  Influencing users towards better passwords: persuasive cued click-points , 2008 .

[31]  David Griffiths,et al.  Shoulder surfing defence for recall-based graphical passwords , 2011, SOUPS.

[32]  Robert Biddle,et al.  Graphical Password Authentication Using Cued Click Points , 2007, ESORICS.

[33]  A. Ant Ozok,et al.  A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.

[34]  Richard C. Atkinson,et al.  Human Memory: A Proposed System and its Control Processes , 1968, Psychology of Learning and Motivation.

[35]  Michael K. Reiter,et al.  On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.

[36]  Frank Stajano,et al.  The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.

[37]  Blase Ur,et al.  Can long passwords be secure and usable? , 2014, CHI.

[38]  Alain Forget,et al.  Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism , 2012, IEEE Transactions on Dependable and Secure Computing.

[39]  Alain Forget,et al.  Multiple password interference in text passwords and click-based graphical passwords , 2009, CCS.

[40]  Tadayoshi Kohno,et al.  A comprehensive study of frequency, interference, and training of multiple graphical passwords , 2009, CHI.

[41]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.

[42]  Jeff Yan,et al.  Do background images improve "draw a secret" graphical passwords? , 2007, CCS '07.

[43]  Alexander De Luca,et al.  It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception , 2014, SOUPS.

[44]  Jason I. Hong,et al.  A diary study of password usage in daily life , 2011, CHI.

[45]  Nasir D. Memon,et al.  PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..

[46]  Nasir D. Memon,et al.  Modeling user choice in the PassPoints graphical password scheme , 2007, SOUPS '07.

[47]  Blase Ur,et al.  A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior , 2015, CHI.

[48]  Julie Thorpe,et al.  Usability and security evaluation of GeoPass: a geographic location-password scheme , 2013, SOUPS.

[49]  Alain Forget,et al.  Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords , 2010, CHI.

[50]  Burton S. Kaliski,et al.  PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.