Exploring the Potential of GeoPass: A Geographic Location-Password Scheme
暂无分享,去创建一个
[1] Heinrich Hußmann,et al. Using fake cursors to secure on-screen password entry , 2013, CHI.
[2] Julie Thorpe,et al. Analyzing User Choice in Graphical Passwords , 2004 .
[3] Cormac Herley,et al. Do Strong Web Passwords Accomplish Anything? , 2007, HotSec.
[4] Robert Biddle,et al. Do you see your password?: applying recognition to textual passwords , 2012, SOUPS.
[5] Mahdi N. Al-Ameen,et al. The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords , 2015, SOUPS.
[6] Blase Ur,et al. Correct horse battery staple: exploring the usability of system-assigned passphrases , 2012, SOUPS.
[7] Robert Biddle,et al. Graphical passwords: Learning from the first twelve years , 2012, CSUR.
[8] Matthew Smith,et al. Where Have You Been? Using Location-Based Security Questions for Fallback Authentication , 2015, SOUPS.
[9] Dino Schweitzer,et al. A security class project in graphical passwords , 2010 .
[10] Nasir D. Memon,et al. Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.
[11] Mahdi N. Al-Ameen,et al. Leveraging Real-Life Facts to Make Random Passwords More Memorable , 2015, ESORICS.
[12] Mahdi N. Al-Ameen,et al. Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues , 2015, CHI.
[13] Robert Biddle,et al. Facing the facts about image type in recognition-based graphical passwords , 2011, ACSAC '11.
[14] David Mazières,et al. A future-adaptive password scheme , 1999 .
[15] Nikita Borisov,et al. The Tangled Web of Password Reuse , 2014, NDSS.
[16] Hung-Min Sun,et al. PassMap: a map based graphical-password authentication system , 2012, ASIACCS '12.
[17] Ian Oakley,et al. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords , 2016, IEEE Transactions on Human-Machine Systems.
[18] Blase Ur,et al. "I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab , 2015, SOUPS.
[19] Alain Forget,et al. Improving text passwords through persuasion , 2008, SOUPS '08.
[20] F. Craik,et al. Depth of processing and the retention of words , 1975 .
[21] Blase Ur,et al. Do Users' Perceptions of Password Security Match Reality? , 2016, CHI.
[22] Xiang Cao,et al. Enabling concurrent dual views on common LCD screens , 2012, CHI.
[23] Heinrich Hußmann,et al. Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns , 2015, CHI.
[24] Lujo Bauer,et al. Encountering stronger password requirements: user attitudes and behaviors , 2010, SOUPS.
[25] Wanli Ma,et al. Impact of restrictive composition policy on user password choices , 2011, Behav. Inf. Technol..
[26] Heinrich Hußmann,et al. SwiPIN: Fast and Secure PIN-Entry on Smartphones , 2015, CHI.
[27] Alain Forget,et al. User interface design affects security: patterns in click-based graphical passwords , 2009, International Journal of Information Security.
[28] Matthew K. Wright,et al. A study of user password strategy for multiple accounts , 2013, CODASPY '13.
[29] Robert Biddle,et al. A second look at the usability of click-based graphical passwords , 2007, SOUPS '07.
[30] Alain Forget,et al. Influencing users towards better passwords: persuasive cued click-points , 2008 .
[31] David Griffiths,et al. Shoulder surfing defence for recall-based graphical passwords , 2011, SOUPS.
[32] Robert Biddle,et al. Graphical Password Authentication Using Cued Click Points , 2007, ESORICS.
[33] A. Ant Ozok,et al. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.
[34] Richard C. Atkinson,et al. Human Memory: A Proposed System and its Control Processes , 1968, Psychology of Learning and Motivation.
[35] Michael K. Reiter,et al. On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.
[36] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[37] Blase Ur,et al. Can long passwords be secure and usable? , 2014, CHI.
[38] Alain Forget,et al. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism , 2012, IEEE Transactions on Dependable and Secure Computing.
[39] Alain Forget,et al. Multiple password interference in text passwords and click-based graphical passwords , 2009, CCS.
[40] Tadayoshi Kohno,et al. A comprehensive study of frequency, interference, and training of multiple graphical passwords , 2009, CHI.
[41] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[42] Jeff Yan,et al. Do background images improve "draw a secret" graphical passwords? , 2007, CCS '07.
[43] Alexander De Luca,et al. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception , 2014, SOUPS.
[44] Jason I. Hong,et al. A diary study of password usage in daily life , 2011, CHI.
[45] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..
[46] Nasir D. Memon,et al. Modeling user choice in the PassPoints graphical password scheme , 2007, SOUPS '07.
[47] Blase Ur,et al. A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior , 2015, CHI.
[48] Julie Thorpe,et al. Usability and security evaluation of GeoPass: a geographic location-password scheme , 2013, SOUPS.
[49] Alain Forget,et al. Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords , 2010, CHI.
[50] Burton S. Kaliski,et al. PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.