On Purely Automated Attacks and Click-Based Graphical Passwords
暂无分享,去创建一个
[1] Christof Koch,et al. Modeling attention to salient proto-objects , 2006, Neural Networks.
[2] T. Wright,et al. A Picture Memory. , 2003 .
[3] J. Kase. Graphical Passwords , 2008 .
[4] Antonio Torralba,et al. Top-down control of visual attention in object detection , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[5] Nasir D. Memon,et al. Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.
[6] Michael K. Reiter,et al. On User Choice in Graphical Password Schemes , 2004, USENIX Security Symposium.
[7] C. Koch,et al. Computational modelling of visual attention , 2001, Nature Reviews Neuroscience.
[8] Dorin Comaniciu,et al. Mean Shift: A Robust Approach Toward Feature Space Analysis , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[9] Rafael C. González,et al. Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Nasir D. Memon,et al. Modeling user choice in the PassPoints graphical password scheme , 2007, SOUPS '07.
[11] Julie Thorpe,et al. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords , 2007, USENIX Security Symposium.
[12] Nasir D. Memon,et al. Graphical passwords based on robust discretization , 2006, IEEE Transactions on Information Forensics and Security.
[13] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[14] Julie Thorpe,et al. On predictive models and user-drawn graphical passwords , 2008, TSEC.
[15] Rafael C. González,et al. Digital image processing, 3rd Edition , 2008 .
[16] Christopher G. Harris,et al. A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.
[17] Christof Koch,et al. A Model of Saliency-Based Visual Attention for Rapid Scene Analysis , 2009 .
[18] Richard P. Ayers,et al. Picture Password: A Visual Login Technique for Mobile Devices , 2003 .
[19] L. Itti,et al. Modeling the influence of task on attention , 2005, Vision Research.
[20] J. Wolfe,et al. Guided Search 2.0 A revised model of visual search , 1994, Psychonomic bulletin & review.
[21] Robert Biddle,et al. A second look at the usability of click-based graphical passwords , 2007, SOUPS '07.
[22] Alain Forget,et al. Influencing users towards better passwords: persuasive cued click-points , 2008 .
[23] Robert Biddle,et al. Graphical Password Authentication Using Cued Click Points , 2007, ESORICS.
[24] Linda G. Shapiro,et al. Computer Vision , 2001 .
[25] N. Cowan. The magical number 4 in short-term memory: A reconsideration of mental storage capacity , 2001, Behavioral and Brain Sciences.
[26] Nasir D. Memon,et al. Robust discretization, with an application to graphical passwords , 2003, IACR Cryptol. ePrint Arch..
[27] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[28] Heinz Hügli,et al. Empirical Validation of the Saliency-based Model of Visual Attention , 2003 .
[29] Nasir D. Memon,et al. PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..
[30] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[31] Susan Wiedenbeck,et al. Authentication Using Graphical Passwords: Basic Results , 2005 .